As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and …
Implementing security and privacy requirements at every level of the software development cycle is imperative for ensuring optimum usability as well as the users' satisfaction. Software …
Efficient change control and configuration management is imperative for addressing the emerging security threats in cloud infrastructure. These threats majorly exploit …
Advances supported by emerging wearable technologies in healthcare promise patients a provision of high quality of care. Wearable computing systems represent one of the most …
Group estimation of user stories is an important part of extreme programming (XP), used for both planning releases and iterations. Research has shown that although group estimation …
Despite the attractive benefits of cloud-based business processes, security issues, cloud attacks, and privacy are some of the challenges that prevent many organizations from using …
K Kanakogi, H Washizaki, Y Fukazawa, S Ogata… - Information, 2021 - mdpi.com
For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such …
Nowadays, reliability of sensors is one of the most important challenges for widespread application of Internet-of-things data in key emerging fields such as the automotive and …
Cloud computing has become today's most common technology buzzword. Despite the promises of cloud computing to decrease computing implementation costs and deliver …