Cargando…
An Efficient Identification of Security Threats in Requirement Engineering Methodology
Today, we completely rely on Information Technology (IT) applications for every aspect of daily life, including business and online transactions. In addition to using these IT-enabled applications for business purposes, we also use WhatsApp, Facebook, and a variety of other IT applications to commun...
Autores principales: | Subha, R., Haldorai, Anandakumar |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9410943/ https://www.ncbi.nlm.nih.gov/pubmed/36035846 http://dx.doi.org/10.1155/2022/1872079 |
Ejemplares similares
-
Intelligent spectrum handovers in cognitive radio networks
por: Haldorai, Anandakumar, et al.
Publicado: (2019) -
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange
por: Natsiavas, Pantelis, et al.
Publicado: (2018) -
Computing and communication systems in urban development: a detailed perspective
por: Haldorai, Anandakumar, et al.
Publicado: (2019) -
EAI international conference on big data innovation for sustainable cognitive computing: BDCC 2018
por: Haldorai, Anandakumar, et al.
Publicado: (2019) -
The role of cloud computing technology: A savior to fight the lockdown in COVID 19 crisis, the benefits, characteristics and applications
por: Alhomdy, Sharaf, et al.
Publicado: (2021)