Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s, about 500 …
SE Ooi, R Beuran, T Kuroda, T Kuwahara, R Hotchi… - Computers & …, 2023 - Elsevier
Given the typical complexity of networked systems in terms of number of components and their interconnections, manually designing their architecture is inherently difficult, and the …
D Foster, L White, J Adams, DC Erdil… - … Companion of the 23rd …, 2018 - dl.acm.org
Cloud Computing adoption has seen significant growth over the last five years. It offers a diverse range of scalable and redundant service deployment models, including …
Blockchain technology is one of the most important and disruptive technologies in the world. Multiple industries are adopting the blockchain technology to innovate the way they work …
W Balzano, S Stranieri - … and Network Applications: Proceedings of the …, 2019 - Springer
Abstract Ant Colony Optimization (ACO) is a known, largely employed paradigm for optimization algorithm. It is a bio-inspired approach following the real world ants beahvior in …
In the recent years, we are assisting to an undiminished, and unlikely to stop number of cyber threats, that have increased the organizations/companies interest about security …
Digital medical images are very easy to be modified for illegal purposes. An attacker may perform this act in order to stop a political candidate, sabotage research, commit insurance …
SE Ooi, R Beuran, Y Tan, T Kuroda… - Proceedings of the …, 2022 - dl.acm.org
Design and management of networked systems, such as Information Technology/Network (IT/NW) or IoT systems, are inherently complex. Moreover, the need to adhere to security …
YD Al-Otaibi - ACM Transactions on Internet Technology (TOIT), 2021 - dl.acm.org
Cloud services provide decentralized and pervasive access for resources to reduce the complex infrastructure requirements of the user. In decentralized service access, the …