Systematic map** study on security approaches in secure software engineering
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …
integral component of human society. Such wide use of software systems consists of large …
Ranking security of IoT-based smart home consumer devices
NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …
based assistants, smart lighting, and security cameras have widely adopted the Internet of …
An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications
Security and usability are often thought of as being contradictive in nature. One affects the
other negatively. The relation and trade-offs between usability and security must be detected …
other negatively. The relation and trade-offs between usability and security must be detected …
[HTML][HTML] Development of sustainable modified sand concrete: An experimental study
The present study aims to develop 4 types of sustainable modified sand using various
proportions of desert sand, natural crushed sand, and recycled crushed sand. The …
proportions of desert sand, natural crushed sand, and recycled crushed sand. The …
[PDF][PDF] A fuzzy multi-objective covering-based security quantification model for mitigating risk of web based medical image processing system
Medical image processing is one of the most active research areas and has big impact on
the health sector. With the arrival of intelligent processes, web based medical image …
the health sector. With the arrival of intelligent processes, web based medical image …
A knowledge-based integrated system of hesitant fuzzy set, AHP and TOPSIS for evaluating security-durability of web applications
There has been a phenomenal increase in the use of web applications in every facet of
human endeavor. From education, healthcare, banking, business to governance and so …
human endeavor. From education, healthcare, banking, business to governance and so …
The greenhouse technology in different climate conditions: A comprehensive energy-saving analysis
One of the most critical barriers for using a greenhouse is the energy consumption for
heating generation, which explains the vital role of energy efficiency. In this study, a model …
heating generation, which explains the vital role of energy efficiency. In this study, a model …
[HTML][HTML] A hybrid fuzzy rule-based multi-criteria framework for sustainable-security assessment of web application
The present day environment of cyber-attacks is a threat to even the most secure systems.
With each passing day, the attackers are adapting new technologies to infiltrate systems and …
With each passing day, the attackers are adapting new technologies to infiltrate systems and …
Toward selection of trustworthy and efficient E-learning platform
B Alojaiman - IEEE Access, 2021 - ieeexplore.ieee.org
The e-learning sector continues to evolve, with a growing number of eLearning resources
available to businesses, government agencies, and individual people. With the fastest …
available to businesses, government agencies, and individual people. With the fastest …
Evaluating the usable-security of healthcare software through unified technique of fuzzy logic, ANP and TOPSIS
FA Al-Zahrani - IEEE Access, 2020 - ieeexplore.ieee.org
The current research efforts in the security domain are essentially inspired by the intention to
ensure both healthcare software's security and usability. Practitioners are continuously …
ensure both healthcare software's security and usability. Practitioners are continuously …