|
|
|
Yolanda Valdés-Rodríguez, Jorge Hochstetter-Diez, Jaime Díaz-Arancibia and Rodrigo Cadena-Martínez
Software development must be based on more than just the experience and capabilities of your programmers and your team. The importance of obtaining a quality product lies in the risks that can be exploited by software vulnerabilities, which can jeopardiz...
ver más
|
|
|
|
|
|
|
An?e Mihelic, Toma? Hovelja and Simon Vrhovec
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ...
ver más
|
|
|
|
|
|
|
Aqsa Sayeed, Chaman Verma, Neerendra Kumar, Neha Koul and Zoltán Illés
The Internet of robotic things (IoRT) is the combination of different technologies including cloud computing, robots, Internet of things (IoT), artificial intelligence (AI), and machine learning (ML). IoRT plays a major role in manufacturing, healthcare,...
ver más
|
|
|
|
|
|
|
Ronghua Xu, Yu Chen, Genshe Chen and Erik Blasch
The rapid development of three-dimensional (3D) acquisition technology based on 3D sensors provides a large volume of data, which are often represented in the form of point clouds. Point cloud representation can preserve the original geometric informatio...
ver más
|
|
|
|
|
|
|
Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka and G. Priyalakshmi
Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s, about 500 security patterns have been proposed. Although the technical components are we...
ver más
|
|
|
|
|
|
|
Pang-Wei Tsai, Aris Cahyadi Risdianto, Meng Hui Choi, Satis Kumar Permal and Teck Chaw Ling
In global networks, Border Gateway Protocol (BGP) is widely used in exchanging routing information. While the original design of BGP did not focus on security protection against deliberate or accidental errors regarding to routing disruption, one of fund...
ver más
|
|
|
|
|
|
|
Wei-Chen Lin, Po-Kai Huang, Chung-Long Pan and Yu-Jung Huang
Medication safety administration is a complicated process involving the information of patients, drugs, and data storage. The sensitive data transmitted through wireless sensor networks (WSNs) from Internet of things (IoT) over an insecure channel is vul...
ver más
|
|
|
|
|
|
|
Ahmed Bahaa, Ahmed Abdelaziz, Abdalla Sayed, Laila Elfangary and Hanan Fahmy
In many enterprises and the private sector, the Internet of Things (IoT) has spread globally. The growing number of different devices connected to the IoT and their various protocols have contributed to the increasing number of attacks, such as denial-of...
ver más
|
|
|
|
|
|
|
Jithin R and Priya Chandran
The introduction of the internet in embedded devices led to a new era of technology?the Internet of Things (IoT) era. The IoT technology-enabled device market is growing faster by the day, due to its complete acceptance in diverse areas such as domicile ...
ver más
|
|
|
|