The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requireme...
Social Engineering (SE) threats have constituted a reality for Information Technology (IT) systems for many years. Yet, even the latest editions of the generally accepted Informat...
Evangelos Frangopoulos, Mariki M. Eloff, Lucas M. ...
— The engineering of complex production automation systems involves experts from several backgrounds, such as mechanical, electrical, and software engineering. The production aut...
Thomas Moser, Stefan Biffl, Wikan Danar Sunindyo, ...
Database modeling is still a job of an artisan. Due to this approach database schemata evolve by growth without any evolution plan. Finally, they cannot be examined, surveyed, cons...
Software-intensive systems are systems of systems that rely on complex interdependencies among themselves as well as with their operational environment to satisfy the required beh...