An energy-efficient MAC protocol for wireless sensor networks

W Ye, J Heidemann, D Estrin - Proceedings. Twenty-first …, 2002 - ieeexplore.ieee.org
This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless
sensor networks. Wireless sensor networks use battery-operated computing and sensing …

Ranking criteria based on fuzzy ANP for assessing E-commerce web sites

R Rekik, I Kallel, AM Alimi - 2016 IEEE international conference …, 2016 - ieeexplore.ieee.org
Assessing E-commerce web sites quality is essential not only to have recommendations for
improvement but also to make comparisons with competitors. In this paper, the aim is to …

[图书][B] Heurísticas para evaluar la usabilidad de aplicaciones web bancarias

NYF Díaz - 2016 - search.proquest.com
La rápida evolución de las tecnologías de información ha cambiado el modo en el que nos
relacionamos tanto en el ámbito personal como en los negocios. Esta revolución no es …

Dual-Technique Privacy & Security Analysis for E-Commerce Websites Through Automated and Manual Implementation

U Kishnani, S Das - arXiv preprint arXiv:2410.14960, 2024 - arxiv.org
As e-commerce continues to expand, the urgency for stronger privacy and security
measures becomes increasingly critical, particularly on platforms frequented by younger …

Usability heuristics for web banking

N Fierro, C Zapata - Design, User Experience, and Usability: Design …, 2016 - Springer
The rapid development of technology has changed the way in which humans and computers
interact. This revolution is no stranger to the banking sector, there is a tendency to migrate …

[PDF][PDF] Measuring security of web services in requirement engineering phase

D Mougouei, W Rahman, MM Almasi - International Journal of Cyber …, 2012 - Citeseer
Addressing security in early stages of web service development has always been a major
engineering trend. However, to assure security of web services it is required to perform …

Effective measurement requirements for network security management

R Ahmad, S Sahib, MP Nor'Azuwa - arXiv preprint arXiv:1405.5287, 2014 - arxiv.org
Technical security metrics provide measurements in ensuring the effectiveness of technical
security controls or technology devices/objects that are used in protecting the information …

Evaluating fault tolerance in security requirements of web services

D Mougouei, WNWA Rahman… - Proceedings Title: 2012 …, 2012 - ieeexplore.ieee.org
It is impossible to identify all of the internal and external security faults (vulnerabilities and
threats) during the security analysis of web services. Hence, complete fault prevention would …

Game theoretical analysis of usable security and privacy

C Justine, RR Prasad, C Thomas - Security and Privacy, 2021 - Wiley Online Library
Security, privacy, and usability are among the most important concerns in system and
application design. Enhanced security, privacy, and usability features in a product definitely …

A pattern methodology to specify usable security in websites

RM González, J Muñoz-Arteaga… - … on Database and …, 2009 - ieeexplore.ieee.org
This paper presents an overview of a new pattern methodology which is oriented to achieve
basic usability and security design requirements in websites. We emphasize the need of …