DN Su, NAN Nguyen, LNT Nguyen, TT Luu… - Journal of Hospitality …, 2022 - Taylor & Francis
Considering the importance of customer trust in the m-commerce domain, this study aims to examine the role of technology acceptance model (TAM) factors, mobile service quality (M …
Context: Mobile applications (apps) have become deeply personal, constantly demanding access to privacy-sensitive information in exchange for more personalized user …
Implementing security and privacy requirements at every level of the software development cycle is imperative for ensuring optimum usability as well as the users' satisfaction. Software …
C Wang, F Pastore, A Goknil… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Acceptance testing is a validation activity performed to ensure the conformance of software systems with respect to their functional requirements. In safety critical systems, it plays a …
J Singh, J Singh - Information and Software Technology, 2020 - Elsevier
Malicious software deliberately affects the computer systems. Malware are analyzed using static or dynamic analysis techniques. Using these techniques, unique patterns are …
G Paolone, M Marinelli, R Paesani, P Di Felice - Computers, 2020 - mdpi.com
As Web applications become more and more complex, the development costs are increasing as well. A Model Driven Architecture (MDA) approach is proposed in this paper …
Convolutional Neural Networks (CNN) have been successfully applied to image classification problems. Although powerful, they require a large amount of memory. The …
Security testing aims at verifying that the software meets its security properties. In modern Web systems, however, this often entails the verification of the outputs generated when …
During software development activities, it is important for Information and Communication Technology (ICT) practitioners to know and understand practices and guidelines regarding …