Zobrazeno 1 - 10
of 93
pro vyhledávání: '"Beckers, Kristian"'
Autor:
Constante, Fabiola Moyón, Soares, Rafael, Pinto-Albuquerque, Maria, Méndez, Daniel, Beckers, Kristian
Publikováno v:
International Conference on Product-Focused Software Process Improvement PROFES 2020: 434-452
In the last decade, companies adopted DevOps as a fast path to deliver software products according to customer expectations, with well aligned teams and in continuous cycles. As a basic practice, DevOps relies on pipelines that simulate factory swim-
Externí odkaz:
http://arxiv.org/abs/2105.13024
Publikováno v:
International Conference on Current Trends in Theory and Practice of Informatics SOFSEM 2021: Theory and Practice of Computer Science pp 458-471
Many industrial software development processes today have to comply with security standards such as the IEC~62443-4-1. These standards, written in natural language, are ambiguous and complex to understand. This is especially true for non-security exp
Externí odkaz:
http://arxiv.org/abs/2105.13413
Publikováno v:
Product-Focused Software Process Improvement - 21st International Conference, PROFES 2020
Integrating security into agile software development is an open issue for research and practice. Especially in strongly regulated industries, complexity increases not only when scaling agile practices but also when aiming for compliance with security
Externí odkaz:
http://arxiv.org/abs/2105.13404
Autor:
Barela, James, Gasiba, Tiago Espinha, Suppan, Santiago Reinhard, Berges, Marc, Beckers, Kristian
Many people are unaware of the digital dangers that lie around each cyber-corner. Teaching people how to recognize dangerous situations is crucial, especially for those who work on or with computers. We postulated that interactive graphic vignettes c
Externí odkaz:
http://arxiv.org/abs/2101.02106
Teaching industry staff on cybersecurity issues is a fundamental activity that must be undertaken in order to guarantee the delivery of successful and robust products to market. Much research attention has been devoted to this topic over the last yea
Externí odkaz:
http://arxiv.org/abs/2101.02100
Publikováno v:
Proceedings of the 2018 ACM Conference on Data and Application Security and Privacy
The assessment of new vulnerabilities is an activity that accounts for information from several data sources and produces a `severity' score for the vulnerability. The Common Vulnerability Scoring System (\CVSS) is the reference standard for this ass
Externí odkaz:
http://arxiv.org/abs/1803.07648
Recent efforts in practical symbolic execution have successfully mitigated the path-explosion problem to some extent with search-based heuristics and compositional approaches. Similarly, due to an increase in the performance of cheap multi-core commo
Externí odkaz:
http://arxiv.org/abs/1712.06843
Publikováno v:
EPTCS 259, 2017, pp. 16-30
Modern socio-technical systems are increasingly complex. A fundamental problem is that the borders of such systems are often not well-defined a-priori, which among other problems can lead to unwanted behavior during runtime. Ideally, unwanted behavio
Externí odkaz:
http://arxiv.org/abs/1710.05720
Publikováno v:
In Reliability Engineering and System Safety February 2017 158:185-195