19   Artículos

 
en línea
An?e Mihelic, Toma? Hovelja and Simon Vrhovec    
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu    
The research presented in the paper aims at increasing the capacity to identify security weaknesses in programming languages that are less supported by specialized security analysis tools, based on the knowledge gathered from securing the popular ones, f... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sara Palacios Chavarro, Pantaleone Nespoli, Daniel Díaz-López and Yury Niño Roa    
Software is behind the technological solutions that deliver many services to our society, which means that software security should not be considered a desirable feature anymore but more of a necessity. Protection of software is an endless labor that inc... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu    
Software developers represent the bastion of application security against the overwhelming cyber-attacks which target all organizations and affect their resilience. As security weaknesses which may be introduced during the process of code writing are com... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Alfred Zimmermann,Bartosz Marcinkowski     Pág. I - II
The potential of the Internet and related digital technologies, such as the Internet of Things (IoT), cognition and artificial intelligence, data analytics, services computing, cloud computing, mobile systems, collaboration networks, and cyber-physical s... ver más
Revista: Complex Systems Informatics and Modeling Quarterly    Formato: Electrónico

 
en línea
D.V. Baldov,S.Yu. Petrova,A.A. Lebedev     Pág. 27 - 34
At present, the value of information is practically equal to the value of material objects. Modern industries operate with huge data streams, which are subject to increased security and reliability requirements. Likewise, the Nizhny Novgorod State Engine... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Petr Mlynek,Radek Fujdiak,Pavel Mrnustik,Bohuslav Krena,Ludovic Apvrille     Pág. 1 - 9
Nowadays, software and system development is a more complex process than ever was and it faces challenges, where security became one of the most crucial. Based upon co-engineering in the AQUAS project, complex standards covering development processes reg... ver más

 
en línea
Abdulrahman Alreshidi, Aakash Ahmad, Ahmed B. Altamimi, Khalid Sultan and Rashid Mehmood    
Mobile cloud computing (MCC) has recently emerged as a state-of-the-art technology for mobile systems. MCC enables portable and context-aware computation via mobile devices by exploiting virtually unlimited hardware and software resources offered by clou... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Melissa Carlton, Yair Levy     Pág. 16 - 28
Cyber threats have been growing with social engineering and business e-mail compromise reported as the two most rising penetration vectors. Advanced Persistent Threats (APTs) are penetration techniques that combine several approaches to gain access to or... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

 
en línea
Angélica Flórez, Lenin Serrano, Urbano Gómez, Luis Suárez, Alejandro Villarraga and Hugo Rodríguez    
This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC). This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, w... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »