2018
DOI: 10.1007/978-981-13-1402-5_17
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting Software Reliability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
56
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(56 citation statements)
references
References 23 publications
0
56
0
Order By: Relevance
“…In this paper, the authors have postulated a framework for security of the third party software of medical imaging devices by using Fuzzy ANP-TOPSIS methodology. Security assessment of third party software component goal is divided into criteria, sub-criteria, and alternatives [15,19]. All of these have been explained in section-III in this paper and in Fig.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, the authors have postulated a framework for security of the third party software of medical imaging devices by using Fuzzy ANP-TOPSIS methodology. Security assessment of third party software component goal is divided into criteria, sub-criteria, and alternatives [15,19]. All of these have been explained in section-III in this paper and in Fig.…”
Section: Discussionmentioning
confidence: 99%
“…The reason behind it is the denial of service attacks, information leaks and logical flaws in the device. We used Fuzzy ANP-TOPSIS methods for assessing the software security in medical device provided by the medical device manufacturers and third party software providers [14,15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Interrelation between software security management and context-driven ontologies Figure 1 shows the relationship between software security management, context-driven ontology, and ontology for security management. The concept of ontology plays an important role in the semantic web and particularly in universal computing and next-generation mobile communication systems [16][17][18][19][20]. Ontology can provide a better way of creating associations.…”
Section: Proposed Methods 21 Needs and Significancementioning
confidence: 99%
“…As per the findings of the authors, statistics and data show that research trends are focusing on the security aspect of the web, Android and other relevant areas of computer. For example, Brandon Amos et al has proposed a technique by combining machine learning and dynamic analysis approach for better detection of malware online [47,[72][73][74].…”
Section: Security Will Remain a Strong Focus For Malware Analysismentioning
confidence: 99%