Showing 41 - 60 results of 10,931 for search '"software"', query time: 0.05s Refine Results
  1. 41

    Landscape Design Software: Evaluation and Recommendations for Homeowners by Gail Hansen, Smith Watkins, Sydney Park Brown

    Published 2016-02-01
    “… Homeowners who are computer literate and want to improve their landscapes often consider purchasing software so that they can create the design themselves and save money. …”
    Get full text
    Article
  2. 42

    Survey of software anomaly detection based on deception by Jianming FU, Chang LIU, Mengfei XIE, Chenke LUO

    Published 2022-02-01
    “…Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security.Traditional control flow integrity and address space randomization technologies have effectively prevented the pace of APT.However, the complexity of the software and the evolution of attacks make the software still being vulnerable.For this reason, deception defense with resources as bait is an indispensable supplement for network security.The trapping mechanism consists of bait design and attack detection, which infer possible unauthorized access or malicious attacks by sensing the interaction behavior with the bait.According to the three types of bait, which are file, data and code, the automatic construction scheme of bait is designed and deployed, and the effectiveness of bait is measured from the aspects of believability, detectability and enticement, etc.Ransom ware detection based on deception defense focuses on the deployment location of bait files, and in the area of vulnerability detection, code reuse attacks are detected by injecting bait code.Research work related to the implementation of deception defense in each phase of APT attacks was introduced, and the mechanism of deception defense from bait type, bait generation, bait deployment, and bait measurement was described.Simultaneously, deception defense applications in ransom ware detection, vulnerability detection, and Web security were analyzed.In response to the shortcomings of existing ransom ware detection research in terms of bait file design and deployment, a dynamic update method of bait for ransom ware detection was proposed.The deception defense challenges were discussed and hoped that deception defense can provide theoretical and technical support for discovering unknown attacks and attack attribution.…”
    Get full text
    Article
  3. 43
  4. 44

    Incorporating Accessibility Elements to the Software Engineering Process by Wesley Tessaro Andrade, Rodrigo Gonçalves de Branco, Maria Istela Cagnin, Débora Maria Barroso Paiva

    Published 2018-01-01
    “…Thus, making accessible software available can contribute to solution of problems that currently exist in relation to access to information and services by all citizens. …”
    Get full text
    Article
  5. 45
  6. 46
  7. 47
  8. 48

    Behaviour Analysis of Mobile Malicious Software in Network by Xuetao Du, Ling Chang, Jia Liu, Chen Zhang

    Published 2015-08-01
    Subjects: “…mobile malicious software…”
    Get full text
    Article
  9. 49

    Automating Risk Analysis of Software Design Models by Maxime Frydman, Guifré Ruiz, Elisa Heymann, Eduardo César, Barton P. Miller

    Published 2014-01-01
    “…One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. …”
    Get full text
    Article
  10. 50

    Using Game Development to Teach Software Architecture by Alf Inge Wang, Bian Wu

    Published 2011-01-01
    “…This paper describes a case study of how a game project using the XNA Game Studio from Microsoft was implemented in a software architecture course. In this project, university students have to construct and design a type of software architecture, evaluate the architecture, implement an application based on the architecture, and test this implementation. …”
    Get full text
    Article
  11. 51
  12. 52

    Software-Defined Value Stream Process Systems by Max Goebels, Alexander Schulte, Patrick Georgi, Fabian Heimberger, Jannik Schwalm, Oliver Liewerenz, Adrian Schäfer, Jürgen Fleischer, Alexander Verl, Hans-Christian Möhring, Volker Schulze, Sven Matthiesen, Nejila Parspour

    Published 2025-01-01
    “…This paper introduces software-defined value stream process systems (SVPSs), a novel approach that extends the concept of software-defined manufacturing into autonomous, reconfigurable production systems. …”
    Get full text
    Article
  13. 53
  14. 54
  15. 55
  16. 56
  17. 57

    SYMBOLIC EXECUTION IN AUTOMATICALLY GENERATIONOF DATA OF SOFTWARE TESTING by Tô Hữu Nguyên, Nguyễn Hồng Tân, Hà Thị Thanh, Đỗ Thanh Mai

    Published 2016-06-01
    “…In software testing area, all test cases are often generated manually. …”
    Get full text
    Article
  18. 58

    Software Project Risk Identification Based on Scrum Artifacts by Lina Bisikirskienė, Lina Čeponienė, Gytis Vilutis, Adelė Nečionytė

    Published 2025-01-01
    “…Risk identification, as a foundational step in risk management, is essential for the success of software development projects, including those using the Scrum methodology. …”
    Get full text
    Article
  19. 59

    Characterizing Software Stability via Change Propagation Simulation by Weifeng Pan, Haibo Jiang, Hua Ming, Chunlai Chai, Bi Chen, Hao Li

    Published 2019-01-01
    “…Software stability means the resistance to the amplification of changes in software. …”
    Get full text
    Article
  20. 60

    Improved Ant Algorithms for Software Testing Cases Generation by Shunkun Yang, Tianlong Man, Jiaqi Xu

    Published 2014-01-01
    “…Existing ant colony optimization (ACO) for software testing cases generation is a very popular domain in software testing engineering. …”
    Get full text
    Article