نتایج جستجو برای: security concern

تعداد نتایج: 277671  

2012
Martín Ochoa Ronderos

Achieving security in practical systems is a hard task. As it is the case for other critical system properties (i.e. safety), security should be a concern through all the phases of software development, starting with the very early phases of requirements and design, because of the potential impact of unwanted behaviour. Moreover, it remains a critical concern throughout a system’s life-span, be...

2011
Erin L. Puzo Ryan P. Brenner

Over the past decade, worldwide increases in terrorist activities by both state and non-state actors has created a need for a real-time monitoring system that can identify and classify potential threats from a safe stand-off distance. Specifically, since the beginning of both the Iraq and Afghan wars, a major concern for coalition forces has been maintaining security for their bases, convoys, t...

2015
Suraj Verma Prashant Pillai Yim Fun Hu

With the advent of Wireless Sensor Networks (WSN) and its immense popularity in a wide range of applications, security has been a major concern for these resource-constraint systems. Alongside security, WSNs are currently being integrated with existing technologies such as the Internet, satellite, Wi-Max, WiFi, etc. in order to transmit data over long distances and hand-over network load to mor...

2015
Tianbo Lu Jinyang Zhao Lingling Zhao Yang Li Xiaoyan Zhang

Today, cyber physical systems (CPS) are becoming popular in power networks, healthcare devices, transportation networks, industrial process and infrastructures. As cyber physical systems are used more and more extensively and thoroughly, security of cyber physical systems has become the utmost important concern in system design, implementation and research. Many kinds of attacks arise (e.g. the...

2016
Triveni Ambre Priyanka More

Power system and its security and analysis have been taken a major concern in day to day life. SECURITY evaluation is an important issue in planning and operation stages of an electric power system. This paper proposes a novel fuzzy logic Controller by using Jfuzzy Logic. A fuzzy logic-based classification method is developed to predict the security index of a given power system operating point...

Journal: :Computers & Security 2005
Giampaolo Bella Stefano Bistarelli

Security protocols are used pervasively to protect distributed communications in the third Millennium. This motivates the need for a definition of Information Assurance for security protocols, which, to the best of our knowledge, is still missing. Such a definition is advanced in terms of the requirements that security protocols be analysed at the same time realistically, accurately and formall...

2009

Security is a challenging task in software engineering. Enforcing security policies should be taken care of during the early phases of the software development life cycle to more efficiently integrate security into software. Since security is a crosscutting concern that pervades the entire software, integrating security solutions at the software design level may result in the scattering and tan...

2007
Kawin Supaporn Nakornthip Prompoon Thongchai Rojkangsadan

Security requirement is one of essential requirements for the currently information system. Since, the system without security is risk to attack or fail. Consequently, stakeholders and developers must concern with security requirements. However, the security requirement is rather difficult to define correctly and completely because it requires experience and knowledge from stakeholders and deve...

2011
Dhirendra Pandey Ugrasen Suman A. K. Ramani

Security refers the protection of software products from unauthorised access, alteration and destruction. Therefore, security requirement is a presently a major concern of software system and it is generally recommended to take care of security prior to software development process. Risk management is one of the most important aspects of security requirement engineering domain, which allows com...

2015
Yudi Prayudi Imam Riadi

Security and confidentiality of data or information at the present time has become an important concern. Advanced methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military, medical, homeland security, and other applications. Various kinds of techniques for increase security data or information already is developed, one common way ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید