We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Defining a Secure Software Process

    Many organizations take the view that features are the most important delivery and with limited time and resources, this becomes the focus. At the...
    Chapter 2024
  2. Safe Software and Secure Software

    In most cyber-physical systems, the functionality is implemented in software. Therefore, the software is responsible for a significant part of safety...
    Chapter 2022
  3. ARM TrustZone and Secure Operating Systems

    This chapter covers ARM TrustZone technology and secure operating systems. It first describes the ARM TrustZone technology as a security extension in...
    Chapter 2023
  4. Planning for Secure Software Requirements and Design with UML

    It is not possible to build an excellent software product quickly without understanding the requirements. It is known in the security world (and...
    Chapter 2024
  5. Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems

    The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services....

    Sriramulu Bojjagani, Denslin Brabin, ... Umamaheswararao Batta in Computing
    Article 07 May 2024
  6. Abstract security patterns and the design of secure systems

    During the initial stages of software development, the primary goal is to define precise and detailed requirements without concern for software...

    Eduardo B. Fernandez, Nobukazu Yoshioka, ... Joseph Yoder in Cybersecurity
    Article Open access 01 April 2022
  7. State of the Art in Secure Software Systems Development

    In the last decades, various concepts have been developed to support the development and maintenance of secure software systems. On the level of...
    Chapter 2022
  8. Develop and Maintain Secure Systems and Software

    Statistically speaking, a significant number of data breaches have been caused by flaws in applications and by the hackers who attempted to exploit...
    Arthur B. Cooper Jr., Jeff Hall, ... Ben Rothke in The Definitive Guide to PCI DSS Version 4
    Chapter 2023
  9. An Intelligent Blockchain-based Secure Link Failure Recovery Framework for Software-defined Internet-of-Things

    The frequency of link failures in Internet-of-Things (IoT) network are more than the node failures. Hence, effective link recovery schemes are...

    Jehad Ali, Gaoyang Shan, ... Byeong-hee Roh in Journal of Grid Computing
    Article 20 October 2023
  10. Safe and secure system architectures for cyber-physical systems

    Cyber-physical systems are at the core of our current civilization. Countless examples dominate our daily life and work, such as driverless cars that...

    Frank J. Furrer in Informatik Spektrum
    Article Open access 03 April 2023
  11. Securing Enterprise Software Systems

    The consumer-driven economy has made the enterprise software systems exposing more and more enterprise assets (data and systems) to external parties...
    Chapter 2023
  12. Software and hardware realizations for different designs of chaos-based secret image sharing systems

    Secret image sharing (SIS) conveys a secret image to mutually suspicious receivers by sending meaningless shares to the participants, and all shares...

    Bishoy K. Sharobim, Muhammad Hosam, ... Ahmed G. Radwan in Journal of Real-Time Image Processing
    Article Open access 06 May 2024
  13. Software approaches for resilience of high performance computing systems: a survey

    With the scaling up of high-performance computing systems in recent years, their reliability has been descending continuously. Therefore, system...

    Jie Jia, Yi Liu, ... Depei Qian in Frontiers of Computer Science
    Article 12 December 2022
  14. Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques

    There has been a discernible rise in the growth and progress of the Internet, networking, and mobile communication. The complexity of networking...

    Zaid Mustafa, Rashid Amin, ... Naeem Ahmed in Cluster Computing
    Article 25 April 2024
  15. Designing blockchain based secure autonomous vehicular internet of things (IoT) architecture with efficient smart contracts

    The future of autonomous vehicles is exciting and holds significant potential for transforming transportation. The future is bright, but these...

    Hemani, Dayashankar Singh, Rajendra Kumar Dwivedi in International Journal of Information Technology
    Article 07 February 2024
  16. Performance evolution of configurable software systems: an empirical study

    As a software system evolves, its performance can improve or degrade over time. Performance evolution is especially delicate in configurable software...

    Christian Kaltenecker, Stefan Mühlbauer, ... Sven Apel in Empirical Software Engineering
    Article Open access 13 November 2023
  17. Quantum software engineering and quantum software development lifecycle: a survey

    Quantum software engineering is advancing in the domain of quantum computing research and application, yet the documentation is scattered. The slow...

    Kanishk Dwivedi, Majid Haghparast, Tommi Mikkonen in Cluster Computing
    Article Open access 25 March 2024
  18. Analyze quantum security in software design using fuzzy-AHP

    Quantum Security is a conceptual phenomenon of security that uses the quantum mechanical concept in computing. Superposition and entanglement are the...

    Article 15 June 2024
  19. Explainable software systems: from requirements analysis to system evaluation

    The growing complexity of software systems and the influence of software-supported decisions in our society sparked the need for software that is...

    Larissa Chazette, Wasja Brunotte, Timo Speith in Requirements Engineering
    Article Open access 14 November 2022
  20. Dependable and secure infrastructures and systems in intelligent environments

    Simona Bernardi, Matthias Eckhart, ... Simin Nadjm-Tehrani in Journal of Reliable Intelligent Environments
    Article 04 August 2023
Did you find what you were looking for? Share feedback.