Security awareness in the software arena

RV O'Connor, R Colomo-Palacios - … to Risk, Crisis and Security in …, 2018 - taylorfrancis.com
The pervasiveness of information systems and software products in the creation of critical
infrastructures has raised the value of security and trustworthiness of such systems, with …

RETRACTED ARTICLE: Non functional requirement based software architecture scheme with security requirement using hybrid group search optimization and …

R Ramkumar, GSA Mala - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Managing non functional requirements has been a challenge onto software engineers for a
long time. Throughout the years, numerous strategies and methods have been proposed to …

Exposing the gap between Automotive and Cloud Requirements Engineering Practices

G Zsolnai, I Vidackovic - 2024 - gupea.ub.gu.se
Vehicle-to-Cloud based systems require the engineering of both Automotive and Cloud
components working in harmony. On a larger scale, these systems require collaboration …

Hardware-based security methods for Internet of Things (IoT), Internet of Everything (IoE) & Cyber-Physical Systems (CPS)

Α Τσαγδής - 2022 - polynoe.lib.uniwa.gr
Hardware security has emerged as a prominent study area in the last decade, drawing
academics, businesses and governments alike. Electronic data processing now controls …

[PDF][PDF] Database System Development for Operational Parameter of RSG-GAS based on web

M Susmikanti, ASC Aep Saepudin Catur… - … PARAMETER OF RSG …, 2017 - academia.edu
BASED ON WEB. The Information and data collection for parameter operation are important
well documented for the aging management of research reactor RSG-GAS. The RSG-GAS …

Relationships among Dimensions of Information System Success and Benefits of Cloud

WH Stanley - 2021 - search.proquest.com
Despite the many benefits offered by cloud computing's design architecture, there are many
fundamental performance challenges for IT managers to manage cloud infrastructures to …

[PDF][PDF] Assessment of factors impacting customer buying behaviour in software product companies

MH Rehman, S Majumdar, CYS Krishna - IUJ J. Manage, 2017 - journal.iujharkhand.edu.in
Software product management is the process of managing software that is built and
implemented as a product, taking into account life-cycle considerations of the product. It is …

[图书][B] Shared Wireless Infrastructures in Large Public Venues: Case Studies on Preventing Data Breaches

GG Aguilera - 2021 - search.proquest.com
The purpose of this qualitative multiple case study was to uncover effective strategies to
reduce the risk of cybersecurity data breaches of wireless IT network infrastructures at large …

Multi-defense Framework for Mitigating Man in the Cloud Attack (MitC)

P Saravanan, K Swarnapriya… - i-Manager's Journal on …, 2019 - search.proquest.com
Cloud computing is the technology of forming a network of remote servers hosted on the
Internet to manage process and store data. This technology has its own drawback from the …

An approach to teaching secure programming in the. NET environment

S Bangani, L Futcher, J van Niekerk - Annual Conference of the Southern …, 2019 - Springer
The security aspect of software applications is considered as the important aspect that can
reflect the ability of a system to prevent data exposures and loss of information. For …