You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The goal of this dissertation is to support developers in applying security checks using community knowledge. Artificial intelligence approaches combined with natural language processing techniques are employed to identify security-related information from community websites such as Stack Overflow or GitHub. All security-related information is stored in a security knowledge base. This knowledge base provides code fragments that represent the community´s knowledge about vulnerabilities, security-patches, and exploits. Comprehensive knowledge is required to carry out security checks on software artifacts, such as data covering known vulnerabilities and their manifestation in the source code a...
This book constitutes the proceedings of the 15th International Conference on Risks and Security of Internet and Systems, CRiTIS 2020, which took place during November 4-6, 2020. The conference was originally planned to take place in Paris, France, but had to change to an online format due to the COVID-19 pandemic. The 16 full and 7 short papers included in this volume were carefully reviewed and selected from 44 submissions. In addition, the book contains one invited talk in full paper length. The papers were organized in topical sections named: vulnerabilities, attacks and intrusion detection; TLS, openness and security control; access control, risk assessment and security knowledge; risk analysis, neural networks and Web protection; infrastructure security and malware detection.
This open access book presents the outcomes of the “Design for Future – Managed Software Evolution” priority program 1593, which was launched by the German Research Foundation (“Deutsche Forschungsgemeinschaft (DFG)”) to develop new approaches to software engineering with a specific focus on long-lived software systems. The different lifecycles of software and hardware platforms lead to interoperability problems in such systems. Instead of separating the development, adaptation and evolution of software and its platforms, as well as aspects like operation, monitoring and maintenance, they should all be integrated into one overarching process. Accordingly, the book is split into thr...
This book constitutes the revised selected papers from the 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018, held in Arcachon, France, in October 2018. The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.
Requirements engineering (RE) has the overall goal of establishing the vision of the system in its relevant context. For this goal, all stakeholders must disclose, discuss, and align their mental models of the system by explicitly communicating their goals, ideas, needs, and expectations. This procedure serves to develop and negotiate a shared understanding and is called requirements communication. In this thesis, I analyze the application of videos as a documentation option in RE to support effective requirements communication for shared understanding. Videos used for this purpose are called vision videos. Based on a technology transfer process, I develop a candidate solution consisting of ...
This text is written with a business school orientation, stressing the how to and heavily employing CASE technology throughout. The courses for which this text is appropriate include software engineering, advanced systems analysis, advanced topics in information systems, and IS project development. Software engineer should be familiar with alternatives, trade-offs and pitfalls of methodologies, technologies, domains, project life cycles, techniques, tools CASE environments, methods for user involvement in application development, software, design, trade-offs for the public domain and project personnel skills. This book discusses much of what should be the ideal software engineer's project related knowledge in order to facilitate and speed the process of novices becoming experts. The goal of this book is to discuss project planning, project life cycles, methodologies, technologies, techniques, tools, languages, testing, ancillary technologies (e.g. database) and CASE. For each topic, alternatives, benefits and disadvantages are discussed.
This book provides essential insights on the adoption of modern software engineering practices at large companies producing software-intensive systems, where hundreds or even thousands of engineers collaborate to deliver on new systems and new versions of already deployed ones. It is based on the findings collected and lessons learned at the Software Center (SC), a unique collaboration between research and industry, with Chalmers University of Technology, Gothenburg University and Malmö University as academic partners and Ericsson, AB Volvo, Volvo Car Corporation, Saab Electronic Defense Systems, Grundfos, Axis Communications, Jeppesen (Boeing) and Sony Mobile as industrial partners. The 17...
The papers of the present volume investigate the potential of the metaphor of life as theater for literary, philosophical, juridical and epistemological discourses from the Middle Ages through modernity, and focusing on traditions as manifold as French, Spanish, Italian, German, Russian and Latin-American.
This book is part II of a two-volume work that contains the refereed proceedings of the 13th International Conference on Model Driven Engineering Languages and Systems, MODELS 2010, held in Oslo, Norway, during October 3-8, 2010. The 54 revised full papers presented were carefully reviewed and selected from 252 submissions. The papers are organized in topical sections on genericity and generalization, model migration and incremental manipulation, modeling model transformations, verifying consistency and conformance, taming modeling complexity, modeling user-system interaction, model-driven quality assurance, managing variability, multi-modeling approaches, distributed/embedded software development, (de)composition and refactoring, model change, (meta)models at runtime, requirements engineering, slicing and model transformations, incorporating quality concerns in MDD, model-driven engineering in practice, and modeling architecture.