Results 11 to 20 of about 1,328,609 (285)

Secure Software Leasing

open access: yes, 2021
Formulating cryptographic definitions to protect against software piracy is an important research direction that has not received much attention. Since natural definitions using classical cryptography are impossible to achieve (as classical programs can always be copied), this directs us towards using techniques from quantum computing. The seminal work
Prabhanjan Ananth, Rolando L. La Placa
openaire   +2 more sources

A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN

open access: yesIEEE Access, 2019
Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently.
Jin Yang   +4 more
doaj   +1 more source

Software Architecture of Code Analysis Frameworks Matters: The Frama-C Example [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2015
Implementing large software, as software analyzers which aim to be used in industrial settings, requires a well-engineered software architecture in order to ease its daily development and its maintenance process during its lifecycle.
Julien Signoles
doaj   +1 more source

SOFTWARE SECURITY OVERVIEW

open access: yesСистеми управління, навігації та зв’язку. Збірник наукових праць, 2019
The article analyzes the main threats and problems of software protection. Methods for protecting information, their advantages and disadvantages are considered, and the possibility of using existing tools to protect software is studied. The possibility of improving and using a number of software protection methods against active fraud attacks was ...
Rashidinia, Anoushirvan   +3 more
openaire   +2 more sources

Measuring security requirements for software security [PDF]

open access: yes2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS), 2011
For the last decade's software security has gained attention by industries, experts and all other communities. Secure software is about mitigating risks from assets to achieve business goals. Security is highly depending on the context where software is deployed. But measuring software security even within a specific context is still not mature.
Shareeful Islam, Paolo Falcarin
openaire   +1 more source

Process of designing robust, dependable, safe and secure software for medical devices: Point of care testing device as a case study [PDF]

open access: yes, 2013
This article has been made available through the Brunel Open Access Publishing Fund.Copyright © 2013 Sivanesan Tulasidas et al. This paper presents a holistic methodology for the design of medical device software, which encompasses of a new way of ...
Balachandran, W   +5 more
core   +3 more sources

Traceability for the maintenance of secure software [PDF]

open access: yes2008 IEEE International Conference on Software Maintenance, 2008
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable software system development, one must ensure the linked entities are truly traceable to each other and the links are updated to reflect true traceability among changed entities.
Y. Yu, J. Jurjens, Mylopoulos, Ioannis
openaire   +2 more sources

A High-Efficiency Data Collection Method Based on Maximum Recharging Benefit in Sensor Networks

open access: yesSensors, 2018
To reduce time delays during data collection and prolong the network lifetime in Wireless Rechargeable Sensor Networks (WRSNs), a type of high-efficiency data collection method based on Maximum Recharging Benefit (DCMRB) is proposed in this paper ...
Chao Sha   +3 more
doaj   +1 more source

On the Security of Security Software

open access: yesElectronic Notes in Theoretical Computer Science, 2006
Currently, security appears to be one of the strongest sales arguments for software vendors all over the world. No other sector of the software industry has undergone a similar wave of mergers and acquisitions recently as the producers of security software. Market analyses from all leading business consultants predict heavy growth in the field, and the
openaire   +2 more sources

Behaver - Behavioural Patterns Verification for Prevention of Physical Penetration Using Identity Theft

open access: yesCommunications, 2018
Nowadays every provider of critical infrastructure is obliged to use alarm systems - mainly simple surveillance CCTV cameras - to increase security and safety of those objects.
Zuzana Kurillova   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy