We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Human-centred cyber secure software engineering

    Software runs our modern day lives: our shop**, our transport and our medical devices. Hence, no citizen can escape the consequences of poor...

    Article Open access 23 December 2022
  2. Secure and trustworthiness IoT systems: investigations and literature review

    Internet of Things (IoT) is creating a new automated environment where human interaction is limited, in which smart-physical objects obtain the power...

    Wiem Bekri, Rihab Jmal, Lamia Chaari Fourati in Telecommunication Systems
    Article 23 January 2024
  3. Defining a Secure Software Process

    Many organizations take the view that features are the most important delivery and with limited time and resources, this becomes the focus. At the...
    Chapter 2024
  4. A Distributed and Secure Software Architecture Based on Blockchain Technology for Application Software

    The use of IoT technology is constantly and uninterruptedly increasing. Sensors in the IoT environment collect large amounts of data and send them to...

    Ali Kooshari, Mehdi Fartash in Wireless Personal Communications
    Article 12 March 2023
  5. Secure image transmission through LTE wireless communications systems

    Secure transmission of images over wireless communications systems can be done using RSA, the most known and efficient cryptographic algorithm, and...

    Farouk Abduh Kamil Al-Fahaidy, Radwan AL-Bouthigy, ... Safwan Abdulkareem in EURASIP Journal on Image and Video Processing
    Article Open access 10 January 2024
  6. Design and Development of Secure Data Transfer Modules in Industrial Control Systems

    Industrial control systems (ICS) like supervisory control and data acquisition (SCADA) systems play a crucial role in monitoring and controlling...

    L. Rajesh, Penke Satyanarayana in Wireless Personal Communications
    Article 21 September 2023
  7. Periodic event-triggered secure consensus for networked mechanical systems under Denial-of-Service attacks

    This paper concentrates on the secure consensus problem of networked mechanical/Euler–Lagrange systems. First, a new periodic event-triggered (PET)...

    Shiqi Zheng, Zhipeng Li, ... Peng Shi in Control Theory and Technology
    Article 03 January 2024
  8. Semi-blind AF transmission in secure NOMA systems

    In the wireless channel state information (CSI)-assisted amplify-and-forward (AF) networks, an instantaneous CSI of the first hop is required to...

    Wided Hadj Alouane in Annals of Telecommunications
    Article 13 September 2023
  9. Safe Software and Secure Software

    In most cyber-physical systems, the functionality is implemented in software. Therefore, the software is responsible for a significant part of safety...
    Chapter 2022
  10. Enabling Secure and Efficient Sharing of Accelerators in Expeditionary Systems

    The addition of FPGAs in the cloud is an emerging effort to support acceleration and performance with the flexibility of logic reprogramming. The...

    Arsalan Ali Malik, Emre Karabulut, ... Aydin Aysu in Journal of Hardware and Systems Security
    Article 08 May 2024
  11. ARM TrustZone and Secure Operating Systems

    This chapter covers ARM TrustZone technology and secure operating systems. It first describes the ARM TrustZone technology as a security extension in...
    Chapter 2023
  12. Planning for Secure Software Requirements and Design with UML

    It is not possible to build an excellent software product quickly without understanding the requirements. It is known in the security world (and...
    Chapter 2024
  13. Secure Communications with THz Reconfigurable Intelligent Surfaces and Deep Learning in 6G Systems

    In anticipation of the 6G era, this paper explores the integration of terahertz (THz) communications with Reconfigurable Intelligent Surfaces (RIS)...

    Ajmeera Kiran, Abhilash Sonker, ... Elangovan Muniyandy in Wireless Personal Communications
    Article 22 May 2024
  14. Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems

    The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services....

    Sriramulu Bojjagani, Denslin Brabin, ... Umamaheswararao Batta in Computing
    Article 07 May 2024
  15. Abstract security patterns and the design of secure systems

    During the initial stages of software development, the primary goal is to define precise and detailed requirements without concern for software...

    Eduardo B. Fernandez, Nobukazu Yoshioka, ... Joseph Yoder in Cybersecurity
    Article Open access 01 April 2022
  16. State of the Art in Secure Software Systems Development

    In the last decades, various concepts have been developed to support the development and maintenance of secure software systems. On the level of...
    Chapter 2022
  17. A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems

    The underwater green transport system ( UwGTs ) is a network of connected, intelligent underwater sensors or Internet of Things (IoT) devices. The...

    Ritika Yaduvanshi, Shivendu Mishra, ... Prince Rajpoot in Annals of Telecommunications
    Article 14 November 2023
  18. Develop and Maintain Secure Systems and Software

    Statistically speaking, a significant number of data breaches have been caused by flaws in applications and by the hackers who attempted to exploit...
    Arthur B. Cooper Jr., Jeff Hall, ... Ben Rothke in The Definitive Guide to PCI DSS Version 4
    Chapter 2023
  19. An Intelligent Blockchain-based Secure Link Failure Recovery Framework for Software-defined Internet-of-Things

    The frequency of link failures in Internet-of-Things (IoT) network are more than the node failures. Hence, effective link recovery schemes are...

    Jehad Ali, Gaoyang Shan, ... Byeong-hee Roh in Journal of Grid Computing
    Article 20 October 2023
  20. Weight Estimation and Secure Control for Discrete Stochastic Distribution Control Systems Under Sparse Sensor Attacks

    In this paper, we investigate the problem of weight estimation and secure control for discrete stochastic distribution control (SDC) systems under...

    **aoyun Yi, Yuwei Ren, ... Ben Niu in International Journal of Control, Automation and Systems
    Article 02 March 2023
Did you find what you were looking for? Share feedback.