Buscar
Mostrando ítems 1-10 de 10962
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
(2017)
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
(2017)
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...
Una metodología para el desarrollo de software seguro (prisonde)
(Ediciones Universidad Simón BolívarFacultad de Ingenierías, 2021-06)
El presente artículo de investigación tiene como objetivo presentar a PRISONDE cuya meta es reducir el número de vulnerabilidades en los aplicativos a medida qué sé van generando, está metodología de desarrollo seguro toma ...
Uma metodologia para o controle de seguranca dinamica de sistemas de energia eletrica
(1998-05-01)
This work presents an algorithm for the security control of electric power systems using control actions like generation reallocation, determined by sensitivity analysis (linearized model) and optimization by neural networks. ...
Uma metodologia para o controle de seguranca dinamica de sistemas de energia eletrica
(1998-05-01)
This work presents an algorithm for the security control of electric power systems using control actions like generation reallocation, determined by sensitivity analysis (linearized model) and optimization by neural networks. ...
Enhancement of power system security level using FACTS controllers and emerging energy storage technologies
(Nova Science Publishers, 2010)
Energy security is jointly with economy one of the most important requirements during the operation of the electric power system (EPS). However, many large blackouts happened worldwide in the last decade with serious ...
Constructing an architecture-based cybersecurity solution for a system
(2023-01-19)
Cybersecurity can be effectively managed with an architecture-based approach, composed with three viewpoints, namely system, security and process. Using models for describing a system and its security objectives enables a ...