91,578 Hits in 6.0 sec

Novel Algorithms for Protective Digital Privacy

Y. N. Prajapati, Ravindra Chauhan
2019 Zenodo  
This defense includes detection, prevention and response to threats through the use of security policies, software tools and IT services.  ...  Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, malicious and accidental threats.  ...  Senthil Shanmugasundaram, International Journal of Software and Computer Science Engineering Volume 4 Issue 1 Review of Various Encryption Techniques" International Journal of Engineering And  ... 
doi:10.5281/zenodo.2582715 fatcat:ps7sqsg6ubemvd3maayqxn5e6a

A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security

Gurpreet Singh, Supriya Supriya
2013 International Journal of Computer Applications  
With the evolution of human intelligence, the art of cryptography has become more complex in order to make information more secure.  ...  Encryption is the process of scrambling a message so that only the intended recipient can read it. Encryption can provide a means of securing information.  ...  Umarani, "A Survey on Various Most Common Encryption Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, pp. 226-233, July  ... 
doi:10.5120/11507-7224 fatcat:ubssrj6znbhchkdhpxw2llumwa

The calibration and validation of a hybrid simulation/regression model of a batch computer system

H. Gomaa
1978 Software, Practice & Experience  
Gomaa, "Software Requirements and Architecture Modeling for Evolving Non-Secure Applications into Secure Applications", Journal of Science of Computer Programming, Volume 66, Issue 1, Pages 60-70, Elsevier  ...  Gomaa, "QoS Management in Service-Oriented Architectures", Journal of Performance Evaluation, Volume 64, Issues 7+8, Pages 646-663, Elsevier, August 2007.  ... 
doi:10.1002/spe.4380080103 fatcat:cnjwf3dq2nbd5d7eoyq6zefge4

Permissible thyroid datasets assessment through kernel PC Algorithm and Vapnik Chervonenkis theory for categorization and classification

Vadamodula Prasad, Tamada Srinivasa Rao
2017 Data-Enabled Discovery and Applications  
P Nagaraju, N Nagamalleswara Rao, "A Detailed Study of Security Aspects in Cloud Computing", International Journal of Emerging Technologies in Engineering Research (IJETER), Vol. 4 No.6, pp 172-176,  ...  RAJU "Theoretical Investigations to Random Testing Variants and its Implications", International Journal of Software Engineering and its Applications", Vol.9, No. 5, pp. 165-172, 2015.  ... 
doi:10.1007/s41688-017-0006-x fatcat:5fbnwem2t5eihltpqy6ymbej5a

Hybrid Matching Algorithm for Personal Names

Cihan Varol, Coskun Bayrak
2012 Journal of Data and Information Quality  
The work involved focusing on error and change propagation to define and validate a set of architectural metrics for assessing quality of software architectures.  ...  Software Architecture Metrics -Led software developer on a NASA sponsored software architectural metrics project.  ...  , C., "Hybrid Matching Algorithm for Personal Names" ACM Journal of Data and Information Quality (ACM JDIQ), Volume 3, Issue 4, Article No: 8, September 2012, doi>10.1145/2348828.2348830 [ 2 ] 2 VAROL  ... 
doi:10.1145/2348828.2348830 dblp:journals/jdiq/VarolB12 fatcat:afk72rr26nb4hobaqk3572dsfm

CORRELATION for Variables Selection in Secure SDLC

S G Gollagi, Prof. Veeranna Kotagi, Dr Piyush Kumar Pareek
2020 Zenodo  
Just a goal, exhaustive, and point by point security assessment of the segments that are being considered for use in the software framework can give solid information on the security suppositions of the  ...  They likewise include clashes between the security suppositions (e.g., about condition benefits that will be accessible) that the engineer has made for the benefit of the notional parts that "populate"  ...  Piyush Kumar Pareek, Identifying Wastes in software, International Journal of Engineering Studies and Technical Approach 40.  ... 
doi:10.5281/zenodo.3757572 fatcat:sve6al2xibgm7pngixdwnaja5e

Elicitation of Non-functional Requirement Preference for Actors of Usecase from Domain Model [chapter]

G. S. Anandha Mala, G. V. Uma
2006 Lecture Notes in Computer Science  
Iso-Array Grammars and Picture Languages, International Journal of Mathematical Sciences, Volume 6, No.3-4,375-390,2007. 5.Arrays, Special sub arrays and computation, International Journal of Applied  ...  Papers Published: National Journals: 1.Learning k-tabled Triangular Pasting Systems, Journal of Mathematics and System Sciences, Volume 3, No.2, 55-64,2007 International Journals : 1.  ... 
doi:10.1007/11961239_23 fatcat:dg6msn5xebaofl37ixdcxmhpam

Automated secure room system

Md Hazrat Ali, Fadhlan Kamaruzaman, Md Arafatur Rahman, Amir Akramin Shafie
2015 2015 4th International Conference on Software Engineering and Computer Systems (ICSECS)  
This paper proposed an integrated dual-level vision-based home security system, which consists of two subsystems -a) movement detection and b) hand verification system.  ...  Vision-based security systems have the greater advantages over the traditional security systems such as using the lock, observing by the security guard, using alarm signal etc.  ...  Computer software Network security Optical flows Security systems Software engineering Hand geometry Home security systems Motion detection Movement detection Room alarming system  ... 
doi:10.1109/icsecs.2015.7333086 fatcat:byf3gmc7sjh63mijtx4subgokm

A Secure Framework for Software Product Line Development

Md. Mottahir, Asif Irshad, Aasim Zafar
2017 International Journal of Computer Applications  
In order to address the issues, companies are moving towards Software Product Line Engineering (SPLE) which helps in providing large varieties of products with minimum development effort and cost.  ...  This paper tries to propose an improved framework for software product line. Cross-cutting concerns such as security and configurability are addressed in this framework.  ...  Asset repository v) The security standards repository International Journal of Computer Applications (0975 -8887) Volume 159 -No 4, February 2017 Fig 5 : 5 Component-Based Product Line engineering [18  ... 
doi:10.5120/ijca2017912919 fatcat:pefk3slvnvhs7a6epc3cbp3usi

Secure two-party k-means clustering

Paul Bunn, Rafail Ostrovsky
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
architecture for protecting integrity and privacy of software,Journal of Parallel and Distributed Computing, Volume 66 , ,Issue 9 (September 2006),Special issue: Security in grid and distributed  ...  "Query optimization in XML structured-document databases" Journal of The International Journal on Very Large Data Bases. pp.270-274. Volume 15, Issue 3. sep 2006. Paper 3: Qi Yu, Athman Bouguettaya.  ... 
doi:10.1145/1315245.1315306 dblp:conf/ccs/BunnO07 fatcat:hv3vdom7kfhp7llmhvsvmdierm

Development of Software Testing Techniques for Early Fault Detection

Dr Piyush Kumar Pareek
2021 Zenodo  
The study in the paper instigates about the techniques of finding the early fault finding in the software.  ...  The result of the study releases the multiple factors in finding the different stages of testing. That may lead to the quality, flexibility and good quality of production.  ...  Journal of Advancement in Parallel Computing Volume 3 Issue 3 Industrial and Systems Engineering, 2(3(2016).  ... 
doi:10.5281/zenodo.4432315 fatcat:tnht6ejsxfcnzcn5onsqjqovdu

Strongly Adequate Software Architecture

Pradip Peter Dey
2011 Zenodo  
Components of a software system may be related in a wide variety of ways. These relationships need to be represented in software architecture in order develop quality software.  ...  This paper analyses relations among the major components of software systems and argues for using several broad categories for software architecture for assessment purposes: strongly adequate, weakly adequate  ...  Systems Engineering Vol:5, No:12, 2011 World Academy of Science, Engineering and Technology International Journal of Computer and Systems Engineering Vol:5, No:12, 2011 1701  ... 
doi:10.5281/zenodo.1055010 fatcat:mcnjpwecyjdqxin2ly5bqvh6pe

Mutual Exclusive Distributive Clustering (MEDC) Protocol for Wireless Sensor Networks

Yashwant Singh, Urvashi Chugh
2014 International Journal of Sensors Wireless Communications and Control  
Ravi Rastogi and Nitin, On a Fast Interconnections, International Journal of Computer Science and Network Security, Volume 10, Number 8, ISSN: 1738-7906, August 2010, pp. 74-79. 48.  ...  "Delivering a Course in Software Engineering: A Hands On Approach".  ... 
doi:10.2174/221032790302140505100253 fatcat:y6ttiopi3nb4nkurzuvdaj77ci

Application of Model Oriented Security Requirements Engineering Framework for secure E-Voting

P. Salini, S. Kanmani
2012 2012 CSI Sixth International Conference on Software Engineering (CONSEG)  
It is called as the Security requirements engineering, which is emerging as a branch of software engineering, International Journal of Computer Engineering and Technology (IJCET), 181 spurred by the realization  ...  Security engineering is a new research area in software engineering that covers the definition of processes, plans and designs for security.  ...  As a result, security International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 -6367(Print), ISSN 0976 -6375(Online) Volume 1, Number 1, May -June (2010), © IAEME 184 requirements  ... 
doi:10.1109/conseg.2012.6349489 fatcat:lmqfm4j6kfgsbe6y6iwcgwwezq

Tool Support of Formal Methods for Privacy by Design [article]

Sibylle Schupp
2019 arXiv   pre-print
Using the techniques of search-based literature review and snowballing this paper answers those questions for a selected set of research papers.  ...  Formal methods are, in principle, suited for supporting the recent paradigm of privacy by design, but no overview is available that summarizes which particular approaches have been investigated, for which  ...  The paper is part of the project "Information Governance Technologies: Ethics, Policies, Architectures, Engineering" funded by the "Landesforschungsförderung Hamburg."  ... 
arXiv:1903.11092v1 fatcat:6mnlr5w5bna77bnphxe7yzzxku
« Previous Showing results 1 — 15 out of 91,578 results