We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Analyze quantum security in software design using fuzzy-AHP

    Quantum Security is a conceptual phenomenon of security that uses the quantum mechanical concept in computing. Superposition and entanglement are the...

    Article 15 June 2024
  2. A systematic literature review on software security testing using metaheuristics

    The security of an application is critical for its success, as breaches cause loss for organizations and individuals. Search-based software security...

    Fatma Ahsan, Faisal Anwer in Automated Software Engineering
    Article 23 May 2024
  3. Software Security

    This chapter focuses on how security failures in software arise and how they can be avoided or counteracted. The main classes of unintentional...
    Chapter 2024
  4. Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability

    Software-defined perimeters (SDP) revolutionize network security by offering dynamic and adaptive access controls, focusing on user and device...

    Antonio Paya, Vicente-GarcĂ­a, Alberto GĂłmez in International Journal of Information Security
    Article 20 May 2024
  5. Survey on identification and prediction of security threats using various deep learning models on software testing

    In this research, authors give a literature analysis of the methods used to detect and anticipate security risks in software testing by using a...

    Suman ., Raees Ahmad Khan in Multimedia Tools and Applications
    Article 03 February 2024
  6. Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System

    Software security vulnerabilities are significant for the software development industry. Exploration is conducted for software development industry...

    Raghavendra Rao Althar, Debabrata Samanta, ... Chaminda Hewage in SN Computer Science
    Article Open access 15 April 2023
  7. Incorporating software security: using developer workshops to engage product managers

    Evidence from data breach reports shows that many competent software development teams still do not implement secure, privacy-preserving software,...

    Charles Weir, Ingolf Becker, Lynne Blair in Empirical Software Engineering
    Article Open access 24 December 2022
  8. Deep learning for the security of software-defined networks: a review

    As the scale and complexity of networks grow rapidly, management, maintenance, and optimization of them are becoming increasingly challenging tasks...

    Roya Taheri, Habib Ahmed, Engin Arslan in Cluster Computing
    Article 15 July 2023
  9. A survey on software-defined vehicular networks (SDVNs): a security perspective

    Smart transportation systems have been the focus of research due to the development of smart cities. However, existing vehicular networks are not...

    Rohit Kumar, Neha Agrawal in The Journal of Supercomputing
    Article 17 December 2022
  10. Software Development Security

    Software development security is integral to the CISSP certification exam. This domain, also called Domain 8, focuses on security’s role in the...
    Mohamed Aly Bouke in CISSP Exam Certification Companion
    Chapter 2023
  11. Software Security Analysis

    Security of software is still today a critical requirement as a lot of attacks exploit vulnerabilities in code. Securing software is, however, a...
    Elisa Bertino, Sonam Bhardwaj, ... Ashraf Y. Mahgoub in Machine Learning Techniques for Cybersecurity
    Chapter 2023
  12. From DevOps to DevSecOps is not enough. CyberDevOps: an extreme shifting-left architecture to bring cybersecurity within software security lifecycle pipeline

    Software engineering is evolving quickly leading to an urgency to discover more efficient development models. DevOps and its security-oriented...

    Federico Lombardi, Alberto Fanton in Software Quality Journal
    Article 26 April 2023
  13. GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks

    Nowadays, the growth of internet users has led to a significant increase in identity fraud security risks. One of the common forms of identity fraud...

    Fabrice Mvah, Vianney Kengne Tchendji, ... Charles Kamhoua in International Journal of Information Security
    Article 26 August 2023
  14. Security Compliance in Model-Driven Software Development

    To ensure the security of a software system, it is vital to keep up with changing security precautions, attacks, and mitigations. Although...
    Chapter Open access 2024
  15. Security Intelligence for Real-Time Security Monitoring Software

    Security Intelligence (SI) describes the practice of collecting, standardizing and analysing data generated by networks, applications and other IT...
    Aneta Poniszewska-MaraƄda, Radoslaw Grela, Natalia Kryvinska in Artificial Intelligence and Soft Computing
    Conference paper 2023
  16. Predicting software vulnerability based on software metrics: a deep learning approach

    The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems....

    Francis Kwadzo Agbenyegah, Micheal Asante, ... Ernest Akpaku in Iran Journal of Computer Science
    Article 05 June 2024
  17. Security Risk Indicator for Open Source Software to Measure Software Development Status

    Recently, open source software (OSS) has become more mainstream. Therefore, the security of OSS is an important topic in information systems that use...
    Hiroki Kuzuno, Tomohiko Yano, ... Toshihiro Yamauchi in Information Security Applications
    Conference paper 2024
  18. A hierarchical model for quantifying software security based on static analysis alerts and software metrics

    Despite the acknowledged importance of quantitative security assessment in secure software development, current literature still lacks an efficient...

    Miltiadis Siavvas, Dionysios Kehagias, ... Erol Gelenbe in Software Quality Journal
    Article 15 May 2021
  19. A Novel Software Defined Security Framework for SDN

    Software Defined Security (SDS) entails the security implementation of a network, based on certain applications. It can be portrayed as a virtualized...
    Srijita Basu, Neha Firdaush Raun, ... Chandan Mazumdar in Risks and Security of Internet and Systems
    Conference paper 2024
  20. A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics

    The goal of this research is to build a vulnerability prediction model to assist developers in evaluating the security of software systems during the...

    Kazi Zakia Sultana, Charles B. Boyd, Byron J. Williams in SN Computer Science
    Article 09 August 2023
Did you find what you were looking for? Share feedback.