Exploring software security approaches in software development lifecycle: A systematic mapping study
There is an increase use of security driven approaches to support software development
activities, such as requirements, design and implementation. The objective of this paper is to …
activities, such as requirements, design and implementation. The objective of this paper is to …
High performance connected digit recognition using hidden Markov models
LR Rabiner, JG Wilpon… - IEEE Transactions on …, 1989 - ieeexplore.ieee.org
The authors use an enhanced analysis feature set consisting of both instantaneous and
transitional spectral information and test the hidden-Markov-model (HMM)-based connected …
transitional spectral information and test the hidden-Markov-model (HMM)-based connected …
Detecting compiler warning defects via diversity-guided program mutation
Compiler diagnostic warnings help developers identify potential programming mistakes
during program compilation. However, these warnings could be erroneous due to the …
during program compilation. However, these warnings could be erroneous due to the …
[PDF][PDF] Secure software development model: A guide for secure software life cycle
MI Daud - Proceedings of the international MultiConference of …, 2010 - iaeng.org
Extreme programming (XP) is a modern approach for iterative development of software in
which you never wait for the complete requirements and start development. Security is …
which you never wait for the complete requirements and start development. Security is …
A phase-wise review of software security metrics
Integrating securit y at each phase of the software Development Life cycle (SDLC) has
become an urgent need. Moreover, security must not be overlooked at early phases of …
become an urgent need. Moreover, security must not be overlooked at early phases of …
Towards more trustable log files for digital forensics by means of “trusted computing”
B Böck, D Huemer, AM Tjoa - 2010 24th IEEE International …, 2010 - ieeexplore.ieee.org
Trustable log data is essential in digital forensic investigations in order to allow reliable
reconstruction of events. Existing solutions do not provide adequate protection, exposing the …
reconstruction of events. Existing solutions do not provide adequate protection, exposing the …
Significance of security metrics in secure software development
ST Siddiqui - International Journal of Applied Information Systems, 2017 - ijais.org
With increasing advancement of technology in the past years rise various security issues
and problems. In this connected world, security is a paramount and challenging issue in …
and problems. In this connected world, security is a paramount and challenging issue in …
Metodología para la Detección de Vulnerabilidades en Redes de Datos
El objetivo principal de este trabajo fue diseñar una metodología para la detección de
vulnerabilidades en redes de datos. Para esto se desarrollaron diferentes fases llamadas …
vulnerabilidades en redes de datos. Para esto se desarrollaron diferentes fases llamadas …
Research on software design level security vulnerabilities
One of the major problems in software security is the lack of knowledge about security
among software developers. Even if a developer has good knowledge about current …
among software developers. Even if a developer has good knowledge about current …
Corridor navigation with a LiDAR/INS Kalman filter solution
W Travis, AT Simmons, DM Bevly - … Vehicles Symposium, 2005., 2005 - ieeexplore.ieee.org
Autonomous capability requires reliable and robust navigation solutions in multiple
environments. GPS has become an effective tool but is not suitable for all environments …
environments. GPS has become an effective tool but is not suitable for all environments …