2014
DOI: 10.1080/19361610.2014.913230
|View full text |Cite
|
Sign up to set email alerts
|

Embedding Dependability Attributes into Component-Based Software Development Using the Best Practice Method: A Guideline

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…To adopt evidence-based practical and theoretical perspectives, researchers, especially in the penetration testing domain, rely on solid empirical evidence that reports methodologies, frameworks, models, and practices. Systematic literature review (SLR) is one of the most suitable methods to encourage evidence-based security practices [93][94][95][96][97][98]. Researchers followed the SLR rules proposed by Kitchenham & Charters [56] and Keele & Bell [99].…”
Section: -3-research Methodologymentioning
confidence: 99%
“…To adopt evidence-based practical and theoretical perspectives, researchers, especially in the penetration testing domain, rely on solid empirical evidence that reports methodologies, frameworks, models, and practices. Systematic literature review (SLR) is one of the most suitable methods to encourage evidence-based security practices [93][94][95][96][97][98]. Researchers followed the SLR rules proposed by Kitchenham & Charters [56] and Keele & Bell [99].…”
Section: -3-research Methodologymentioning
confidence: 99%
“…We did a similar vulnerability assessment in Ref. [35]. Vulnerability assessments of developed web application systems are also performed using similar methodologies.…”
Section: Mdds-cbsd Methodologymentioning
confidence: 99%
“…Traditionally, dependability attributes such as reliability, safety, and integrity are treated as afterthoughts, implemented after the software component is developed. Thus, evaluating component-based software for dependability attributes is critical in determining system dependability [8,[33][34][35][36][37][38].…”
Section: Motivationmentioning
confidence: 99%
“…Moreover, the massive volumes of data contain a lot of distortion, which makes data analysis difficult. Current methodologies lack the level of resilience necessary, necessitating the implementation of novel data analytics techniques and software tools [78,[95][96][97][98][99][100]. On the other hand, appropriate visual techniques must be developed in order to acquire meaningful insights into the data collected.…”
Section: B Rq5: Challenges and Future Directions Of Iot In E-mentioning
confidence: 99%