40,371 Hits in 7.8 sec

Security Via Related Disciplines

Jennifer Bayuk, Barry Horowitz, Rick Jones
2012 Procedia Computer Science  
It adapts the reactor-specific method for achieving diversity for the purposes of safety into a method for systems security engineering that may be applied generally to any system.  ...  and tools (MPTs) that are well established in disciplines that are related to security or have similar goals or objectives.  ...  A design description should include design basis threats and specific metrics support claims for system security goal Diversity Scoring Framework In addition to providing guidelines for diversity analysis  ... 
doi:10.1016/j.procs.2012.01.070 fatcat:3mmtfsj7kvadjbktjtjnvee7gu

Guest Editorial Special Issue on Software Engineering Research and Practices for the Internet of Things

Rodrigo Morales, Rubn Saborido, Shah Rukh Humayoun, Yann-Gael Gueheneuc
2020 IEEE Internet of Things Journal  
select the hardware, communication, and software architectures of IoT systems, which communications protocols are the most suitable for a system, and how to guarantee security and privacy when dealing  ...  S OFTWARE engineering is vital for IoT systems to design systems that are secure, interoperable, modifiable, and scalable.  ...  They identified the unique challenges to the VSE field involving software integration, compatibility and code reusability, safety and reliability assurance, and software security and data privacy.  ... 
doi:10.1109/jiot.2020.3026565 fatcat:6yika7ercbg2rip6ow5hnyxh3i

Scaling Enterprise Recommender Systems for Decentralization [article]

Maurits van der Goes
2021 arXiv   pre-print
Creating a culture of self-service, automation, and collaboration to scale recommender systems for decentralization.  ...  Within decentralized organizations, the local demand for recommender systems to support business processes grows.  ...  By dealing with the diversity in data sources and information technology early and with solution patterns, it is possible to reuse many recommender system artifacts across subsidiaries.  ... 
arXiv:2109.09231v1 fatcat:lg6op2hs3jgk3mvawam7kwaniy

The Multiple Facets of Software Diversity

Benoit Baudry, Martin Monperrus
2015 ACM Computing Surveys  
Four decades later, the literature about software diversity has expanded in multiple directions: goals (fault-tolerance, security, software engineering); means (managed or automated diversity) and analytical  ...  Early experiments with software diversity in the mid 1970's investigated N-version programming and recovery blocks to increase the reliability of embedded systems.  ...  Acknowledgements We would like to thank Paul Amman, Benoit Gauzens and Sebastian Banescu, as well for their valuable feedback on this paper.  ... 
doi:10.1145/2807593 fatcat:2fgpoch6ibajtnbajbdnsseb7u

Artificial Intelligence and Machine Learning in 5G Network Security: Opportunities, advantages, and future research trends [article]

Noman Haider, Muhammad Zeeshan Baig, Muhammad Imran
2020 arXiv   pre-print
Artificial intelligence (AI) and machine learning (ML) can play vital role in design, modelling and automation of efficient security protocols against diverse and wide range of threats.  ...  AI and ML has already proven their effectiveness in different fields for classification, identification and automation with higher accuracy.  ...  Software-centric security for heavily software-driven network. Flexible algorithm modelling with evolving functionality. Adaptive security management and automation.  ... 
arXiv:2007.04490v1 fatcat:wlpeaoyxbjc5pgfctx2eodwrpa

Towards IoT Diversity via Automated Fleet Management

Rustem Dautov, Hui Song
2019 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
To address this challenge, this paper proposes a modelbased diversity engineering approach to enable automated fleet management.  ...  important for IoT vendors aiming to achieve economies of scale.  ...  Acknowledgments This work is supported by the H2020 programme under the grant agreement #780351 (ENACT).  ... 
dblp:conf/models/DautovS19 fatcat:ituforf2sjb47kjdr37tzirgu4

Apply SOA Paradigms in Cyber-Physical System to Enhance Interoperability: State-of-the-Art Review [article]

Su Zhang
2019 arXiv   pre-print
SOA is considered to be a key technology for improving interoperability in next-generation industrial automation systems.  ...  Service-Oriented Architecture (SOA) provides a software design pattern in which software components are connected only through messaging, which is consistent with the fundamentals of modularity and communication  ...  SOA provides a software design pattern in which software components are only connected via messaging.  ... 
arXiv:1903.00065v2 fatcat:gertfiwiarf4xdo3ntbytxxhfy

An Architecture for Dependable Connectivity in OSGi-Enabled Dynamic Distributed Systems

Ali Raza, Keivan Navaie, Richard Nicholson
2018 2018 Fifth International Conference on Internet of Things: Systems, Management and Security  
From air pollution monitoring to debatable surveillance for better security, dynamic distributed systems led to the birth of versatile smart environments.  ...  Prototype system was successfully tested for hardware and software fault tolerance using different test scenarios to ensure uninterrupted service delivery.  ...  ACKNOWLEDGMENT The authors would like to thank Paremus Ltd UK for arranging OSGi training course at London. We are also grateful to anonymous reviewers for their comments to improve this works.  ... 
doi:10.1109/iotsms.2018.8554682 dblp:conf/iotsms/RazaNN18 fatcat:rlj6c45tivbvjexsb4mf23che4

Achieving a trusted, reliable, AI-ready infrastructure for military medicine and civilian trauma care

Cindy Crump, Loretta M. Schlachta-Fairchild, Tien Pham, Latasha Solomon, Katie Rainey
2020 Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II  
Achieving a trusted, reliable, AI-ready infrastructure for military medicine and civilian care," Proc.  ...  The concept of autonomous, artificial intelligence based learning systems for medical support in military Multi-Domain Operations (MDO) to meet evolving demands is presented.  ...  AI/ML may be applied to medical devices and patient monitoring data to identify hidden patterns and features in the data supporting automated probabilistic inferences such as predicting the likelihood  ... 
doi:10.1117/12.2557514 fatcat:tky5lww5g5f6lhfnwmljxwdq54

A Retrospective and Prospective View of Approximate Computing [Point of View}

Weiqiang Liu, Fabrizio Lombardi, Michael Shulte
2020 Proceedings of the IEEE  
Reliability and Security Due to the introduced errors, the reliability of an approximate computing system must be closely examined under environmental variations and aging, as these phenomena may have  ...  Automation at the software layer has also been introduced based on a self-tuning approximation for graphics engines.  ... 
doi:10.1109/jproc.2020.2975695 fatcat:y6l6vww5nbgoljxuny3qjugari

A Model based Test Pattern Generation and Testing Framework for IoT Applications

The main goal of the automation framework is to reduce the effort in the testing process and to make the test process easier for testing the IoT applications by generating various test patterns various  ...  There are various applications that are supported in this domain due to this feature.  ...   Testing the application domains for various factors such as functionality, reliability, scalability, Performance, usability, security, and much more for it to be successful To address this issue,  ... 
doi:10.35940/ijitee.j1051.08810s19 fatcat:xfkqoqif6zhrxpjsp4g34ovaya

An Event-Driven Service Oriented Architecture Approach for E-Governance Systems

Majid Ayoubi, Ali Rehman Shinwari, Mohammad Sabaoon Khan
2019 Kardan journal of engineering and technology  
Meanwhile, the governmental organizations try to automate and accelerate the services for the citizens using ICT.  ...  In this architectural design approach, we proposed a novel Event-Driven architecture supported by integrated service bus to provide diverse system integration for the heterogeneous data of multiple types  ...  This paper, generally, incorporates to combine new technologies such as, SOA and Event-Driven Architecture with new security systems for SOA, to provide, automated, secure and highly integrated software  ... 
doi:10.31841/kjet.2021.1 fatcat:mxnjo5isxvdstcayggcu45pdva

Quality Assurance for Big Data Application – Issuses, Challenges, and Needs

Chuanqi Tao, Jerry Gao
2016 Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering  
Current research work seldom discusses how to effectively validate big data applications to assure system quality.  ...  Moreover, the paper discusses potential testing methods for big data application systems. Furthermore, the primary issues, challenges, and needs in testing big data application are presented.  ...  Hence, it is difficult to determine the correct output for those types of software. Correctness is related to the prediction pattern or model.  ... 
doi:10.18293/seke2016-166 dblp:conf/seke/TaoG16 fatcat:rn74wmxw55hkbkwcznjwr6cley

Improving Security for SCADA Control Systems

Mariana Hentea
2008 Interdisciplinary Journal of Information, Knowledge, and Management  
A depth defense and proactive solutions to improve the security of SCADA control systems ensures the future of control systems and survivability of critical infrastructure.  ...  Executive Summary Information security management principles and processes need to be applied to SCADA systems without exception. We conclude with a thought about the future of SCADA control systems.  ...  A particular exploit usually amounts to the extension of a standard attack pattern to a new target. An attack pattern is a blue print for exploiting software vulnerability.  ... 
doi:10.28945/91 fatcat:dargoytymffwpkh7exc2wu7v6m

Model-Based System Patterns for Automated Ground Vehicle Platforms

Troy Peterson, William D. Schindel
2015 INCOSE International Symposium  
However, it also places significant demands on organizations to ensure rigor and trustworthiness by appropriately improving safety, security and reliability.  ...  To address the diversity and complexity of these systems, the Embedded Intelligence (EI) Pattern, another S*Pattern, is being applied by the team to illustrate its applicability to an AGV Platform Pattern  ...  For AGVs this then permits the configuration and reuse of the general vehicle pattern and EI pattern to cover the diverse range of platforms within the AGV domain.  ... 
doi:10.1002/j.2334-5837.2015.00070.x fatcat:o7arzo3b6jel3nwp3t7pk2jw24
« Previous Showing results 1 — 15 out of 40,371 results