Cargando…
Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model
The modeling of security threats is equally important as the modeling of functional requirements at the design stage of software engineering. However, unlike functional requirements modeling, the modeling of security threats is neglected, which consequently introduces software defects during the ear...
Autores principales: | Ullah, Ubaid, Faiz, Rizwan Bin, Haleem, Muhammad |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9258847/ https://www.ncbi.nlm.nih.gov/pubmed/35793370 http://dx.doi.org/10.1371/journal.pone.0270702 |
Ejemplares similares
-
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach
por: Abbas, Syed Ghazanfar, et al.
Publicado: (2021) -
Electromagnetic Shielding Effectiveness of Woven Fabrics with High Electrical Conductivity: Complete Derivation and Verification of Analytical Model
por: Neruda, Marek, et al.
Publicado: (2018) -
CAVVPM: Challenge-Based Authentication and Verification of Vehicle Platooning at Motorway
por: Arslan, Muhammad, et al.
Publicado: (2022) -
Aspect-Oriented Programming with the e Verification Language: A Pragmatic Guide for Testbench Developers
por: Robinson, David
Publicado: (2007) -
Modelling and Formal Verification of Timing Aspects in Large PLC Programs
por: Fernandez Adiego, B, et al.
Publicado: (2014)