Sciweavers

52 search results - page 10 / 11
» issa 2008
Sort
View
ISSA
2008
13 years 6 months ago
Social Aspects of Information Security
Social Engineering (SE) threats have constituted a reality for Information Technology (IT) systems for many years. Yet, even the latest editions of the generally accepted Informat...
Evangelos Frangopoulos, Mariki M. Eloff, Lucas M. ...
ISSA
2008
13 years 6 months ago
Spam Over Internet Telephony and How to Deal with it
In our modern society telephony has developed to an omnipresent service. People are available at anytime and anywhere. Furthermore the Internet has emerged to an important communi...
Rachid El Khayari, Nicolai Kuntze, Andreas U. Schm...
WCE
2007
13 years 6 months ago
Performing Early Feasibility Studies of Software Development Projects Using Business Process Models
—A new approach to perform feasibility studies using business process models is proposed. The utilization of the improved Role Activity Diagram notations has led to the extractio...
Ayman Issa, Faisal A. Abu Rub
WCE
2007
13 years 6 months ago
Utilising Refactoring To Restructure Use-Case Models
—Use case refactoring is one of the recent software engineering techniques that aimed at synthesising and refining use case models. Two new types of use case refactoring are prop...
Ayman Issa
APSCC
2008
IEEE
13 years 11 months ago
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Yanguo Liu, Issa Traoré, Alexander M. Hoole