P Yeng, S Wolthusen, B Yang - Information Systems (Sofia), 2020 - academia.edu
Reducing time to market (TTM), dynamic requirement changes and increasing profit to service providers are some of the features that are most interesting to software developers …
GK Weldehawaryat, B Katt - The 12th International Conference on …, 2018 - researchgate.net
The need for effective and efficient evaluation schemes of security assurance is growing in many organizations, especially Small and Medium Enterprises (SMEs). Although there are …
Threats to information security can have great impact on business finances and company's reputation. Traditional methodologies for evaluating the maturity of data centers investigate …
Self-adaptive systems (SASs) have emerged as an important technology to support the advancement of autonomous technology. SASs adapt their behaviors at runtime to continue …
Companies often utilize error taxonomies to handle software problems. Agile and scrum- based software engineering procedures leverage software testing and quality management …
When I started my graduation thesis journey in February this year, I wouldn't have guessed that it would have resulted in the thesis that lies before you. Most projects I had done so far …
Security requirements on information systems needs a way to be verified for fulfilment. Accreditation is a tool to measure the level of compliance of the security requirements …
OA Alsaadoun, BA Lawati - HCI in Games: First International Conference …, 2019 - Springer
Edutainment set a unique approach for incorporating learning enriched with dynamic platforms of multimedia end enjoyment. Computerized systems built with edutainment …