2016
DOI: 10.1016/bs.adcom.2016.05.001
|View full text |Cite
|
Sign up to set email alerts
|

Advances in Software Engineering and Software Assurance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 10 publications
0
4
0
1
Order By: Relevance
“…Security analysis frameworks (10) Vulnerability models and metrics (7) Security evaluation reports (11) Security challenges (23) Challenges in test design (18) Challenges in non-functional aspects (5) Quality management challenges (19) Data quality challenges (3) Privacypreservation schemas and protocols (25) Privacy-aware policies and architectures (28) Privacy testing techniques (5) Privacy and trust models (8) Security concepts and policies (49) Authentication schemas and protocols (27) Security-aware architectures & frameworks (45) Security and intrusion models (7) Encryption schemas and protocols (6) Other security schemas and protocols (21) Anomaly detection approaches (5) Security performance analysis (5) based on the code insertion methodology to address the interaction with the physical world. To test the applicability and efficiency of classical approaches, the study emulated the IoT resources from an implementation perspective.…”
Section: Security Analysis Approaches and Techniques (23)mentioning
confidence: 99%
See 3 more Smart Citations
“…Security analysis frameworks (10) Vulnerability models and metrics (7) Security evaluation reports (11) Security challenges (23) Challenges in test design (18) Challenges in non-functional aspects (5) Quality management challenges (19) Data quality challenges (3) Privacypreservation schemas and protocols (25) Privacy-aware policies and architectures (28) Privacy testing techniques (5) Privacy and trust models (8) Security concepts and policies (49) Authentication schemas and protocols (27) Security-aware architectures & frameworks (45) Security and intrusion models (7) Encryption schemas and protocols (6) Other security schemas and protocols (21) Anomaly detection approaches (5) Security performance analysis (5) based on the code insertion methodology to address the interaction with the physical world. To test the applicability and efficiency of classical approaches, the study emulated the IoT resources from an implementation perspective.…”
Section: Security Analysis Approaches and Techniques (23)mentioning
confidence: 99%
“…Security analysis frameworks (10) Vulnerability models and metrics (7) Security evaluation reports (11) Security challenges (23) Challenges in test design (18) Challenges in non-functional aspects (5) Quality management challenges (19)…”
Section: Security Analysis Approaches and Techniques (23)mentioning
confidence: 99%
See 2 more Smart Citations
“…La computación se ha posicionado como un área de apoyo muy importante para la mayoría de los sectores industriales existentes, ya que permite agilizar y realizar tareas complejas en menor tiempo y con menos esfuerzo (Shoemaker et al, 2016). Sin embargo, ser piedra angular de muchos sectores y organizaciones representa un gran reto, pues es necesario contar con los mecanismos adecuados para hacer frente tanto al ritmo vertiginoso de desarrollo de productos como al constante cambio tecnológico que día a día incrementa de forma exponencial.…”
Section: Introductionunclassified