نتایج جستجو برای: forward traceability attack
تعداد نتایج: 203777 فیلتر نتایج به سال:
Traceability is the ability to describe and follow the life of a software artifact and a means for modeling the relations between software artifacts in an explicit way. Traceability has been successfully applied in many software engineering communities and has recently been adopted to document the transition among requirements, architecture and implementation. We present an approach to customiz...
The support for traceability between requirement specifications has been recognised as an important task in the development life-cycle of software systems. In this paper, we present a rule-based approach to support the automatic generation of traceability relations between documents which specify requirement statements and use cases (expressed in structured forms of natural language), and analy...
The purpose of traceability is to ensure persistent alignment of product knowledge between stakeholders, artifacts, and traceability objects. On the other hand, process knowledge is equally important to ensure a systematic software development process with accurate specification and verifiable quality attributes. Previous studies lacks in presenting a consolidated view from product and process ...
Wireless sensor networks passes a practical and Economically feasible alternative to manual data association in general and military scenarios, providing a means of surveillance of a region of field and providing warning of any threats. In common wormhole attack, the attacker receives packets in the network, forward them through a wired or wireless association with high-bandwidth low-latency bo...
Two-factor authentication using password and smart card could reduce the risk than the use of a password alone. Recently, Chen et al. proposed a two-factor remote user authentication protocol using password and smart card and provide the criteria of authentication protocols. They claimed their protocol is secure against certain known attacks. In this paper, the authors showed that Chen et al.’s...
Password-only authenticated key exchange (PAKE) protocols are designed to be secure even when users choose short, easilyguessed passwords. Security requires, in particular, that the protocol cannot be broken by an o -line dictionary attack in which an adversary enumerates all possible passwords in an attempt to determine the correct one based on previously-viewed transcripts. Recently, provably...
Small fixed-wing UAS that are able to hover combine the station keeping abilities of a rotary wing platform and the extended range of conventional aircraft. Current autopilots for these vehicles rely on inertial measurements plus airspeed to transition from forward flight to hover, accumulating appreciable position error during the transition. Once in hover, a combination of inertial and GPS da...
In this paper, we present a security weakness of a forward secure authentication protocol proposed by Tri Van Le et al. called O-FRAP which stands for Optimistic Forward secure RFID Authentication Protocol. In particular, we point out that in the O-FRAP protocol, the server can be subject to a denial-of-service attack due to a flaw in the database querying procedure. Our attack also applies to ...
WANTED: MEASUREMENTS WITH GOOD REFERENCES In nearly all types of activities-be they related to manufacturing, finance, health, regulatory affairs or even sports-people and organizations are becoming sticklers for measurement uncertainty. NIST, the nation’s measurement authority, has responded to this growing customer need for demonstrable uncertainty. It has created an on-line resource— www.nis...
[Context and motivation] Requirements traceability is known as an important part of development projects. Studies showed that traceability is applied in practice, but insufficient tooland method-support hinders its practical use. [Question/problem] We conducted a survey to understand which traceability usage scenarios are most relevant for practitioners. Gaining this information is a required s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید