Suggested Topics within your search.
Suggested Topics within your search.
- Application software 4
- Civil war 2
- Computer-assisted instruction 2
- Development 2
- Economic aspects 2
- Economic development 2
- Education, Elementary 2
- Educational technology 2
- Information technology 2
- Internet in education 2
- Internet in public administration 2
- Nursing 2
- Nursing Assessment 2
- Nursing Care 2
- Perioperative Nursing 2
- Political aspects 2
- Public administration 2
- Surgical nursing 2
- computer 2
- Academic writing 1
- Access control 1
- Automobiles 1
- CAD System Software 1
- Censorship 1
- Computer software 1
- Digital techniques 1
- Digital watermarking 1
- Digitale Photographie 1
- Dissertations, Academic 1
- Engineering 1
-
41
Landscape Design Software: Evaluation and Recommendations for Homeowners
Published 2016-02-01“… Homeowners who are computer literate and want to improve their landscapes often consider purchasing software so that they can create the design themselves and save money. …”
Get full text
Article -
42
Survey of software anomaly detection based on deception
Published 2022-02-01“…Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security.Traditional control flow integrity and address space randomization technologies have effectively prevented the pace of APT.However, the complexity of the software and the evolution of attacks make the software still being vulnerable.For this reason, deception defense with resources as bait is an indispensable supplement for network security.The trapping mechanism consists of bait design and attack detection, which infer possible unauthorized access or malicious attacks by sensing the interaction behavior with the bait.According to the three types of bait, which are file, data and code, the automatic construction scheme of bait is designed and deployed, and the effectiveness of bait is measured from the aspects of believability, detectability and enticement, etc.Ransom ware detection based on deception defense focuses on the deployment location of bait files, and in the area of vulnerability detection, code reuse attacks are detected by injecting bait code.Research work related to the implementation of deception defense in each phase of APT attacks was introduced, and the mechanism of deception defense from bait type, bait generation, bait deployment, and bait measurement was described.Simultaneously, deception defense applications in ransom ware detection, vulnerability detection, and Web security were analyzed.In response to the shortcomings of existing ransom ware detection research in terms of bait file design and deployment, a dynamic update method of bait for ransom ware detection was proposed.The deception defense challenges were discussed and hoped that deception defense can provide theoretical and technical support for discovering unknown attacks and attack attribution.…”
Get full text
Article -
43
Software diversification method based on binary rewriting
Published 2023-04-01Subjects: “…software diversity…”
Get full text
Article -
44
Incorporating Accessibility Elements to the Software Engineering Process
Published 2018-01-01“…Thus, making accessible software available can contribute to solution of problems that currently exist in relation to access to information and services by all citizens. …”
Get full text
Article -
45
Analysis of software defined security model and architecture
Published 2017-06-01Subjects: Get full text
Article -
46
-
47
Research on safety methods of airborne embedded software
Published 2015-11-01Subjects: Get full text
Article -
48
Behaviour Analysis of Mobile Malicious Software in Network
Published 2015-08-01Subjects: “…mobile malicious software…”
Get full text
Article -
49
Automating Risk Analysis of Software Design Models
Published 2014-01-01“…One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. …”
Get full text
Article -
50
Using Game Development to Teach Software Architecture
Published 2011-01-01“…This paper describes a case study of how a game project using the XNA Game Studio from Microsoft was implemented in a software architecture course. In this project, university students have to construct and design a type of software architecture, evaluate the architecture, implement an application based on the architecture, and test this implementation. …”
Get full text
Article -
51
Method of quantitative assessment for diversified software system
Published 2020-03-01Subjects: Get full text
Article -
52
Software-Defined Value Stream Process Systems
Published 2025-01-01“…This paper introduces software-defined value stream process systems (SVPSs), a novel approach that extends the concept of software-defined manufacturing into autonomous, reconfigurable production systems. …”
Get full text
Article -
53
Control and diagnostics of faults in hardware-software complex
Published 2018-04-01Subjects: Get full text
Article -
54
Melhoria de processo de software: Conhecimento, utilização e benefícios em empresas canadenses de desenvolvimento de software
Published 2017-04-01Subjects: “…empresas de desenvolvimento de software…”
Get full text
Article -
55
Heat transfer software for local materials in Cameroon (HTSLM 1.0): simplified building energy software based on local realities
Published 2025-01-01“…This software is intended to be simplified and at a lower cost for the user. …”
Get full text
Article -
56
USE OF INFORMATION AND SOFTWARE IN THE MANAGEMENT SYSTEM OF INTERNATIONAL ENTERPRISES
Published 2025-01-01Subjects: “…information software…”
Get full text
Article -
57
SYMBOLIC EXECUTION IN AUTOMATICALLY GENERATIONOF DATA OF SOFTWARE TESTING
Published 2016-06-01“…In software testing area, all test cases are often generated manually. …”
Get full text
Article -
58
Software Project Risk Identification Based on Scrum Artifacts
Published 2025-01-01“…Risk identification, as a foundational step in risk management, is essential for the success of software development projects, including those using the Scrum methodology. …”
Get full text
Article -
59
Characterizing Software Stability via Change Propagation Simulation
Published 2019-01-01“…Software stability means the resistance to the amplification of changes in software. …”
Get full text
Article -
60
Improved Ant Algorithms for Software Testing Cases Generation
Published 2014-01-01“…Existing ant colony optimization (ACO) for software testing cases generation is a very popular domain in software testing engineering. …”
Get full text
Article