Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Prudence Kadebu"'
Autor:
Prudence Kadebu, Robert T.R. Shoniwa, Kudakwashe Zvarevashe, Addlight Mukwazvure, Innocent Mapanga, Nyasha Fadzai Thusabantu, Tatenda Trust Gotora
Publikováno v:
International Journal of Industrial Engineering and Operations Management, Vol 5, Iss 2, Pp 104-117 (2023)
Purpose – Given how smart today’s malware authors have become through employing highly sophisticated techniques, it is only logical that methods be developed to combat the most potent threats, particularly where the malware is stealthy and makes
Externí odkaz:
https://doaj.org/article/58abb2737750407289d481a41b858539
Publikováno v:
Scientific African, Vol 19, Iss , Pp e01496- (2023)
As trends continue to move toward the introduction of intelligent methods to automate software engineering processes, security requirements classification is rapidly turning into a highly potent field for the software engineering community. There are
Externí odkaz:
https://doaj.org/article/c704414fad6b4db59506faf82bb9ec42
Publikováno v:
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT).
Publikováno v:
Innovations in Smart Cities Applications Edition 2 ISBN: 9783030111953
The current local municipalities’ bureaucracy and the slow manual processing of land enquiry and status checking is frustrating. Firstly information dissemination in respect to land availability is mostly through state media like newspapers on rand
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e810c66d37f257620c3cc9683f7040c7
https://doi.org/10.1007/978-3-030-11196-0_96
https://doi.org/10.1007/978-3-030-11196-0_96
Publikováno v:
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I).
Security Requirements Engineering is a very important process in the Software Development Life Cycle (SDLC) with Security Engineering being given profound attention in the development of software. It is imperative to build security within a software
Publikováno v:
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I).
Security Requirements classification is an important area to the Software Engineering community in order to build software that is secure, robust and able to withstand attacks. This classification facilitates proper analysis of security requirements
Autor:
Vinod Kumar, Innocent Mapanga, Prudence Kadebu, Wadzanayi Chanda, Tripathi Kushboo, Wellington Makondo
Publikováno v:
2017 IST-Africa Week Conference (IST-Africa).
Communication in Mobile Ad hoc (MANETS) networks for end-to-end delivery of packets is achieved cooperatively. This model assumes that an intermediary node will always forward traffic originating from other nodes willingly, other than traffic emanati
Publikováno v:
ICACCI
In the context of exploratory testing (ET), human knowledge and intelligence is applied as a test oracle. The exploratory tester designs and executes the tests on fly and compares the actual output produced by the application under test with the expe