15   Artículos

 
en línea
Yolanda Valdés-Rodríguez, Jorge Hochstetter-Diez, Jaime Díaz-Arancibia and Rodrigo Cadena-Martínez    
Software development must be based on more than just the experience and capabilities of your programmers and your team. The importance of obtaining a quality product lies in the risks that can be exploited by software vulnerabilities, which can jeopardiz... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
An?e Mihelic, Toma? Hovelja and Simon Vrhovec    
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Aqsa Sayeed, Chaman Verma, Neerendra Kumar, Neha Koul and Zoltán Illés    
The Internet of robotic things (IoRT) is the combination of different technologies including cloud computing, robots, Internet of things (IoT), artificial intelligence (AI), and machine learning (ML). IoRT plays a major role in manufacturing, healthcare,... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ronghua Xu, Yu Chen, Genshe Chen and Erik Blasch    
The rapid development of three-dimensional (3D) acquisition technology based on 3D sensors provides a large volume of data, which are often represented in the form of point clouds. Point cloud representation can preserve the original geometric informatio... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Pang-Wei Tsai, Aris Cahyadi Risdianto, Meng Hui Choi, Satis Kumar Permal and Teck Chaw Ling    
In global networks, Border Gateway Protocol (BGP) is widely used in exchanging routing information. While the original design of BGP did not focus on security protection against deliberate or accidental errors regarding to routing disruption, one of fund... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka and G. Priyalakshmi    
Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s, about 500 security patterns have been proposed. Although the technical components are we... ver más
Revista: Information    Formato: Electrónico

 
en línea
Wei-Chen Lin, Po-Kai Huang, Chung-Long Pan and Yu-Jung Huang    
Medication safety administration is a complicated process involving the information of patients, drugs, and data storage. The sensitive data transmitted through wireless sensor networks (WSNs) from Internet of things (IoT) over an insecure channel is vul... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Ahmed Bahaa, Ahmed Abdelaziz, Abdalla Sayed, Laila Elfangary and Hanan Fahmy    
In many enterprises and the private sector, the Internet of Things (IoT) has spread globally. The growing number of different devices connected to the IoT and their various protocols have contributed to the increasing number of attacks, such as denial-of... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jithin R and Priya Chandran    
The introduction of the internet in embedded devices led to a new era of technology—the Internet of Things (IoT) era. The IoT technology-enabled device market is growing faster by the day, due to its complete acceptance in diverse areas such as dom... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »