Zobrazeno 1 - 10
of 170
pro vyhledávání: '"Security requirements engineering"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 2, Pp 191-203 (2022)
As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessity and more
Externí odkaz:
https://doaj.org/article/f1941022c04b48f4ac164928bfe67f03
Publikováno v:
Sensors, Vol 23, Iss 10, p 4979 (2023)
The rapid development of intelligent connected vehicles has increased the attack surface of vehicles and made the complexity of vehicle systems unprecedented. Original equipment manufacturers (OEMs) need to accurately represent and identify threats a
Externí odkaz:
https://doaj.org/article/4b53b77a9fde4772bf7612e860782776
Publikováno v:
Information & Computer Security, 2019, Vol. 27, Issue 5, pp. 711-730.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-04-2019-0052
Publikováno v:
Information & Computer Security, 2018, Vol. 26, Issue 4, pp. 382-400.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-12-2017-0087
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 2, Pp 191-203 (2022)
As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessity and more
Autor:
Christian Schmitt, Peter Liggesmeyer
Publikováno v:
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 3, Pp 15-34 (2015)
This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security i
Externí odkaz:
https://doaj.org/article/291c5f994b0046e384f1e18fa9370adb
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Hassan El-Hadary, Sherif El-Kassas
Publikováno v:
Journal of Advanced Research, Vol 5, Iss 4, Pp 463-472 (2014)
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A m
Externí odkaz:
https://doaj.org/article/ec6f358266654b9596b62f23c4aeb33f
Autor:
Miltiadis Siavvas, Erol Gelenbe, Dimitrios Tsoukalas, Ilias Kalouptsoglou, Maria Mathioudaki, Mert Nakip, Dionysios Kehagias, Dimitrios Tzovaras
Critical everyday activities handled by modern IoT Systems imply that security is of major concern both for the endusers and the industry. Securing the IoT System Architecture is commonly used to strengthen its resilience to malicious attacks.However
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5fe28a0e0cd38179dad2afc19379df60
https://zenodo.org/record/6564200
https://zenodo.org/record/6564200
Autor:
Shafiq ur Rehman, Volker Gruhn
Publikováno v:
Technologies, Vol 6, Iss 3, p 65 (2018)
Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other systems. The heterogeneity of these systems increases the importance of security. Both the developer and the requirement analyst must consider details of not only t
Externí odkaz:
https://doaj.org/article/dd751bed132947c0b38d8d4d60eddf76