2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)最新文献

筛选
英文 中文
Analyzing and evaluating security features in software requirements 分析和评估软件需求中的安全特性
Allenoush Hayrapetian, R. Raje
{"title":"Analyzing and evaluating security features in software requirements","authors":"Allenoush Hayrapetian, R. Raje","doi":"10.1145/3172871.3172879","DOIUrl":"https://doi.org/10.1145/3172871.3172879","url":null,"abstract":"Software requirements, for complex projects, often contain specifications of non-functional attributes (e.g., security-related features). The process of analyzing such requirements is laborious and error prone. Due to the inherent free-flowing nature of software requirements, it is tempting to apply Natural Language Processing (NLP) based Machine Learning (ML) techniques for analyzing these documents from the point of view of comprehensiveness and consistency. In this paper, we propose novel semi-automatic methodology that can assess the security requirements of the software system from the perspective of completeness, contradiction, and inconsistency. Security standards introduced by the ISO are used to construct a model for classifying security-based requirements using NLP-based ML techniques. Hence, this approach aims to identify the appropriate structures that underlie software requirement documents. Once such structures are formalized and empirically validated, they will provide guidelines to software organizations for generating comprehensive and unambiguous requirement specification documents as related to security-oriented features. The proposed solution will assist organizations during the early phases of developing secure software and reduce overall development effort and costs.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131323575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An approach using agile method for software development 一种使用敏捷方法进行软件开发的方法
Bharat Choudhary, Shanu K. Rakesh
{"title":"An approach using agile method for software development","authors":"Bharat Choudhary, Shanu K. Rakesh","doi":"10.1109/ICICCS.2016.7542304","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542304","url":null,"abstract":"Agile software development has rapidly gained a lot of interest in the field of software engineering. Agile software development, despite its novelty, is an important domain of research within software engineering discipline. Agile software development methods have caught the attention of software engineers and researchers worldwide. Scientific research is yet scarce, there has been little detailed reporting of the usage, penetration and success of agile methodologies in traditional, professional software development organizations. We report on the results of an empirical study conducted at Microsoft to learn about agile development and its perception by people in development, testing, and management. This paper reports results from a study, which aims to organize, analyse and make sense out of the dispersed field of agile software development methods.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124194537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Carrier data security using public key steganography in ZigBee ZigBee中使用公钥隐写技术的载波数据安全
Iqra Hussain, Nitin Pandey
{"title":"Carrier data security using public key steganography in ZigBee","authors":"Iqra Hussain, Nitin Pandey","doi":"10.1109/ICICCS.2016.7542357","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542357","url":null,"abstract":"The present time has witnessed a tremendous increase in communications over wireless personal area networks. These communications even include credentials or other sensitive information that in any case need to be protected and not to be read by any third party. So the security of such communications has become a concern and should be emphasized accordingly. A secure communication needs to be communicated in a way that's not susceptible to any sort of eavesdropping or interception. The secure communication defends against the unofficial and the unauthorized interceptors from accessing the communications but still delivering the desired content to the intended communicating parties. Security breaches or the interceptors cannot be totally blocked but such procedures should be taken in account that even if an attack or any sort of an intrusion occurs, the parties involved in the communication must be intimated that there has been some sort of an unwanted interference in the communication taking place. This paper presents a proposition for securing the carrier data by means of Public Key Steganography in the wireless personal area network protocol ZigBee. The proposition doles out with dispensing a secret message to the communicating parties in case of an attack or any attempt compromising the security of data.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115283558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Measuring testing efficiency & effectiveness for software upgradation and its impact on CBP 测量软件升级的测试效率和有效性及其对CBP的影响
R. Majumdar, P. K. Kapur, S. Khatri
{"title":"Measuring testing efficiency & effectiveness for software upgradation and its impact on CBP","authors":"R. Majumdar, P. K. Kapur, S. Khatri","doi":"10.1109/ICICCS.2016.7542347","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542347","url":null,"abstract":"The aim of any company is to deliver reliable product in dynamic and competitive environment. Measuring Testing efficiency and effectiveness is done by proper identification of test attributes and defect origin at various levels of software development phase and removal of these errors becoming an important influencing factor for the invention of quality software. This paper provides an experimental investigation for testing efficiency & effectiveness for software upgradation through numeric example and demonstrates its impact on overall software upgradations as well as on cost, penalty & benefit. The aim of this study is threefold i) To examine the origin of defects and detection during testing phase.(late testing) ii) To investigate proper product release time (early testing)for measuring efficiency and effectiveness and its consequences on overall software upgradation iii) Impact on relative cost, penalty and benefit of a software during its development phase by identifying injected defects and possible magnitudes if they remain untraced and debugged at the final phase before releasing the product.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127819727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Review on widely-used MPPT techniques for PV applications 光伏应用中广泛使用的MPPT技术综述
Abhishek Gupta, R. Saxena
{"title":"Review on widely-used MPPT techniques for PV applications","authors":"Abhishek Gupta, R. Saxena","doi":"10.1109/ICICCS.2016.7542321","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542321","url":null,"abstract":"There are two main drawbacks with PV plants, the high cost of PV cells and their conversion efficiency. In the I-V characteristics of PV module which is non-linear but has a unique maximum power point. To increase or to maximize the output power of photo-voltaic system Maximum power point tracking (MPPT) techniques are used. These techniques give maximum output power, irrespective of the irradiation condition, temperature and load electrical characteristics. For the purpose of tracking the maximum power the MPPT techniques use some electronic converters. This paper presents comparative analysis of three well-known maximum power point tracking algorithms-perturb-and-observe (P&O), incremental conductance (INC), and fractional open-circuit voltage (FVoc).","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125567733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Homomorphic framework to ensure data security in cloud environment 同态框架,确保云环境下的数据安全
R. Jain, S. Madan, B. Garg
{"title":"Homomorphic framework to ensure data security in cloud environment","authors":"R. Jain, S. Madan, B. Garg","doi":"10.1109/ICICCS.2016.7542326","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542326","url":null,"abstract":"Cloud computing technology offers so many luxuries like low cost, ease of accessibility of resources, high performance due to which it becomes a forthcoming revolution among organizations. Organisations are still very reluctant to store their data on cloud because it shifts the organizations data on cloud which is not trustworthy. There are different types of issues like Security, Protection, Identity Management, Management of resources, Management of Power and Energy, Data Isolation, Availability of resources and Heterogeneity of resources which has been observed in cloud computing environment that need to be addressed. According to survey conducted by IDC security was found to be most challenging issue which act as an obstruction in implementation of cloud computing. Cryptographic techniques that can be used as secure storage can help cloud computing at some extent but the major disadvantage of secure storage is that we cannot perform processing on encrypted data. So, in order to provide the security to the cloud network, homomorphic encryption technique can be used. In homomorphic encryption computations can be performed on cipher text and generate an encrypted result which will be same as result of operations performed on the plaintext when decrypted. This means in homomorphic encryption we can process the data without decryption. In this paper security issue is addressed in such a way that client will encrypt password with homomorphic encryption and then server performs equality testing on encrypted data in the form of encrypted array which will be decrypted by owners of data only.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131524624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A generalized framework for modelling multi up-gradations of a software with testing effort and change point 一个具有测试工作量和变更点的软件多次升级建模的通用框架
P. K. Kapur, Gaurav Mishra, A. Shrivastava
{"title":"A generalized framework for modelling multi up-gradations of a software with testing effort and change point","authors":"P. K. Kapur, Gaurav Mishra, A. Shrivastava","doi":"10.1109/ICICCS.2016.7542348","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542348","url":null,"abstract":"The competitive essence of market and rapid change in human's requirement in technology is shrinking the age of softwares. Increasing demand of reliable software and stiff competition in the market has forced software companies for releasing their softwares in multiple versions. Software reliability is a major and leading factor for measuring the software quality, which is essential for consumer satisfaction. In last thirty years, various testing effort based Software Reliability Growth Models (SRGMs) have been proposed in the literature based upon fixed or monotonically growing Fault Detection Rate (FDR). In practice, as the testing grows, skill and efficiency of tester also grows. Also, due to the introduction of new testing strategies, new test cases, defect density, variation in resource allocation and running environment there comes a change in FDR. The point on time line the change in FDR is appears, termed as change point. In this paper we integrated the concept of change point with testing effort to propose a generalized modelling framework to model multi up-gradations of a software. Further, we have used Generalized Modified Weibull Distribution testing effort function for fault estimation. The prognosticative power and accuracy of the model has been work on a real set of failure data of tandem computers for four release.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115834833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multiband microstrip antenna with circular polarization for wireless local area network 无线局域网用圆极化多波段微带天线
P. K. Singh, I. Sharma, Gurinder Singh, H. S. Dhanny
{"title":"Multiband microstrip antenna with circular polarization for wireless local area network","authors":"P. K. Singh, I. Sharma, Gurinder Singh, H. S. Dhanny","doi":"10.1109/ICICCS.2016.7542305","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542305","url":null,"abstract":"This paper presents a design of a low profile, multiband square Microstrip patch antenna with Circular Polarization (CP) for WLAN applications. By simulation and fabrication, it is demonstrated that multiband operation with CP is achieved by incorporating various slots on the Microstrip patch. Microstrip feed is used to excite the single square patch. Proposed antenna shows multiband characteristics at frequency bands2.31 GHz to 2.48 GHz, 3.88 GHz to 3.94 GHz and 4.41 GHz to 4.53 GHz with impedance bandwidths 3.5%, 2.9% and 10.6% respectively. The antenna also produces circular polarization at frequency 2.39 GHz which focuses on the fact that this antenna finds its application in WLAN.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123554650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recommendations for effective cyber security execution 有效执行网络安全的建议
S. Kumar, S. Yadav, Smita Sharma, Akansha Singh
{"title":"Recommendations for effective cyber security execution","authors":"S. Kumar, S. Yadav, Smita Sharma, Akansha Singh","doi":"10.1109/ICICCS.2016.7542327","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542327","url":null,"abstract":"In the arena of computer age cyber security is a big concern to prevent resources of networks, confidential data and crucial information in an organization. The motive of this paper is to highlight the different types of cyber threats and their solution to overcome from them. Besides that, it also describes the different aspects of cyber crime and its security in the global world. Now-a-days, with the expansion of internet usage, cyber security is not restricted to a personal workstation, but also used to suppress information of personal mobile devices like tabs and cell phones because they have become very imperative medium of information transfer due to the current advancements in technology. In order to resolve cyber security issues, the security researcher's community including government sector, academia, private sector must work together to understand the emerging threats to the computing world.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124472259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design and analysis of frequency agile elliptical patch microstrip antenna 频率捷变椭圆贴片微带天线的设计与分析
Priyanka Saxena, Ratnesh Ranjan, Krashnkant Gupta
{"title":"Design and analysis of frequency agile elliptical patch microstrip antenna","authors":"Priyanka Saxena, Ratnesh Ranjan, Krashnkant Gupta","doi":"10.1109/ICICCS.2016.7542338","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542338","url":null,"abstract":"This paper presents the radiation performance of a modified elliptical patch microstrip antenna (EPMA) simulated on FR4 substrate. The elliptical microstrip antennas with small values of eccentricity have been employed to produce circular polarizations (CPs) with the use of single feed point. Theoretical model for an antenna is developed using modal cavity model and circuit theory concept. The arrangement of antenna resonates at four frequencies 5.75 GHz, 6.375 GHz, 8.25 GHz and 13.625 GHz, respectively. The first two frequencies are closely spaced and give an improved bandwidth. The results also show that the compactness is also obtained in the antenna structure. Details of the antenna design approach and theoretical results are presented and discussed systematically.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123584236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信