Search
Search Results
-
Defining a Secure Software Process
Many organizations take the view that features are the most important delivery and with limited time and resources, this becomes the focus. At the... -
Safe Software and Secure Software
In most cyber-physical systems, the functionality is implemented in software. Therefore, the software is responsible for a significant part of safety... -
ARM TrustZone and Secure Operating Systems
This chapter covers ARM TrustZone technology and secure operating systems. It first describes the ARM TrustZone technology as a security extension in... -
Planning for Secure Software Requirements and Design with UML
It is not possible to build an excellent software product quickly without understanding the requirements. It is known in the security world (and... -
Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems
The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services....
-
Abstract security patterns and the design of secure systems
During the initial stages of software development, the primary goal is to define precise and detailed requirements without concern for software...
-
State of the Art in Secure Software Systems Development
In the last decades, various concepts have been developed to support the development and maintenance of secure software systems. On the level of... -
Develop and Maintain Secure Systems and Software
Statistically speaking, a significant number of data breaches have been caused by flaws in applications and by the hackers who attempted to exploit... -
An Intelligent Blockchain-based Secure Link Failure Recovery Framework for Software-defined Internet-of-Things
The frequency of link failures in Internet-of-Things (IoT) network are more than the node failures. Hence, effective link recovery schemes are...
-
Safe and secure system architectures for cyber-physical systems
Cyber-physical systems are at the core of our current civilization. Countless examples dominate our daily life and work, such as driverless cars that...
-
Securing Enterprise Software Systems
The consumer-driven economy has made the enterprise software systems exposing more and more enterprise assets (data and systems) to external parties... -
Software and hardware realizations for different designs of chaos-based secret image sharing systems
Secret image sharing (SIS) conveys a secret image to mutually suspicious receivers by sending meaningless shares to the participants, and all shares...
-
Software approaches for resilience of high performance computing systems: a survey
With the scaling up of high-performance computing systems in recent years, their reliability has been descending continuously. Therefore, system...
-
Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques
There has been a discernible rise in the growth and progress of the Internet, networking, and mobile communication. The complexity of networking...
-
Designing blockchain based secure autonomous vehicular internet of things (IoT) architecture with efficient smart contracts
The future of autonomous vehicles is exciting and holds significant potential for transforming transportation. The future is bright, but these...
-
Performance evolution of configurable software systems: an empirical study
As a software system evolves, its performance can improve or degrade over time. Performance evolution is especially delicate in configurable software...
-
Quantum software engineering and quantum software development lifecycle: a survey
Quantum software engineering is advancing in the domain of quantum computing research and application, yet the documentation is scattered. The slow...
-
Analyze quantum security in software design using fuzzy-AHP
Quantum Security is a conceptual phenomenon of security that uses the quantum mechanical concept in computing. Superposition and entanglement are the...
-
Explainable software systems: from requirements analysis to system evaluation
The growing complexity of software systems and the influence of software-supported decisions in our society sparked the need for software that is...