|
|
|
|
|
|
Date Reviewed |
|
|
1 - 2 of 2
reviews
|
|
|
|
|
|
|
|
Software verification and validation technologies and tools Rodriguez M., Piattini M., Ebert C. IEEE Software 36(2): 13-24, 2019. Type: Article
Rodriguez et al. attempt to explore the existing methods and tools that can be employed to check if (1) software is being built in a way that meets quality standards, and (2) the software product satisfies the intended use. Throughout ...
|
Sep 17 2019 |
|
|
|
|
|
|
Efficient attack graph analysis through approximate inference Muñoz-González L., Sgandurra D., Paudice A., Lupu E. ACM Transactions on Privacy and Security 20(3): 1-30, 2017. Type: Article
In the course of this very well-written and interesting research paper, the authors attempt to show how an existing technique can be employed to analyze attack graphs. In computer security, the analysis of attack graphs has been extens...
|
Jan 24 2018 |
|
|
|
|
|
|
|
|
|
|
|