Works matching DE "COMPUTER software safety measures"
Results: 38
Using UML/MARTE to support performance tuning and stress testing in real-time systems.
- Published in:
- Software & Systems Modeling, 2018, v. 17, n. 2, p. 479, doi. 10.1007/s10270-017-0585-x
- By:
- Publication type:
- Article
Attention Shaping and Software Risk--A Categorical Analysis of Four Classical Risk Management Approaches.
- Published in:
- Information Systems Research, 1998, v. 9, n. 3, p. 233, doi. 10.1287/isre.9.3.233
- By:
- Publication type:
- Article
Fault Tolerance.
- Published in:
- IEEE Software, 2001, v. 18, n. 4, p. 54, doi. 10.1109/MS.2001.936218
- By:
- Publication type:
- Article
Probabilistic timing covert channels: to close or not to close?
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 2, p. 83, doi. 10.1007/s10207-010-0107-0
- By:
- Publication type:
- Article
High Integrity Language Technology HILT 2013/Call for Technical Contributions.
- Published in:
- Ada User Journal, 2012, v. 33, n. 4, p. 268
- Publication type:
- Article
PROTECTION OF COMPUTER PROGRAMS IN EUROPEAN AND CROATIAN LAW - CURRENT ISSUES AND DEVELOPMENT PERSPECTIVE.
- Published in:
- Collected Papers of Zagreb Law Faculty / Zbornik Pravnog Fakulteta u Zagrebu, 2015, v. 65, n. 2, p. 237
- By:
- Publication type:
- Article
Formal Modeling and Verification of Safety-Critical Software.
- Published in:
- IEEE Software, 2009, v. 26, n. 3, p. 42, doi. 10.1109/MS.2009.67
- By:
- Publication type:
- Article
Driven to…Discovering Your Design Values.
- Published in:
- IEEE Software, 2007, v. 24, n. 1, p. 9, doi. 10.1109/MS.2007.10
- By:
- Publication type:
- Article
Computer Games as Virtual Environments for Safety-Critical Software Validation.
- Published in:
- Journal of Information & Organizational Sciences, 2017, v. 41, n. 2, p. 197
- By:
- Publication type:
- Article
Effectively Defining "Shall Not" Requirements.
- Published in:
- IT Professional, 2010, v. 12, n. 3, p. 46, doi. 10.1109/MITP.2009.87
- By:
- Publication type:
- Article
An Empirical Approach for Security Enhancement in Agile Development at Process Level using Fuzzy Logic.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 2582
- By:
- Publication type:
- Article
From the Editor.
- Published in:
- Software Quality Professional, 2016, v. 18, n. 4, p. 3
- By:
- Publication type:
- Article
From the Editor.
- Published in:
- 2015
- Publication type:
- Editorial
Overview.
- Published in:
- Software Quality Professional, 2015, v. 17, n. 3, p. 2
- Publication type:
- Article
Alternating simulation and IOCO.
- Published in:
- International Journal on Software Tools for Technology Transfer, 2012, v. 14, n. 4, p. 387, doi. 10.1007/s10009-011-0215-9
- By:
- Publication type:
- Article
Integrating testing with reliability.
- Published in:
- Software Testing: Verification & Reliability, 2009, v. 19, n. 3, p. 175, doi. 10.1002/stvr.395
- By:
- Publication type:
- Article
Focus section on program debugging.
- Published in:
- Software: Practice & Experience, 2013, v. 43, n. 8, p. 969, doi. 10.1002/spe.2104
- By:
- Publication type:
- Article
Design, implementation and verification of MILS systems.
- Published in:
- Software: Practice & Experience, 2012, v. 42, n. 7, p. 799, doi. 10.1002/spe.1151
- By:
- Publication type:
- Article
Hybrid Obfuscation Using Signals and Encryption.
- Published in:
- Journal of Computer Networks & Communications, 2018, p. 1, doi. 10.1155/2018/6873807
- By:
- Publication type:
- Article
The Effect of Liability and Patch Release on Software Security: The Monopoly Case.
- Published in:
- Production & Operations Management, 2011, v. 20, n. 4, p. 603, doi. 10.1111/j.1937-5956.2010.01189.x
- By:
- Publication type:
- Article
Requirements of a Better Secure Program Coding.
- Published in:
- Informatica Economica, 2012, v. 16, n. 4, p. 93
- By:
- Publication type:
- Article
Integrated Methodology for Software Reliability Analysis.
- Published in:
- Informatica Economica, 2012, v. 16, n. 3, p. 59
- By:
- Publication type:
- Article
An Empirical Evaluation of Mutation Testing for Improving the Test Quality of Safety-Critical Software.
- Published in:
- IEEE Transactions on Software Engineering, 2013, v. 39, n. 6, p. 787, doi. 10.1109/TSE.2012.56
- By:
- Publication type:
- Article
Bayesian theory based software reliability demonstration test method for safety critical software.
- Published in:
- Mathematical Structures in Computer Science, 2014, v. 24, n. 5, p. N.PAG, doi. 10.1017/S0960129513000789
- By:
- Publication type:
- Article
Modelling declassification policies using abstract domain completeness.
- Published in:
- Mathematical Structures in Computer Science, 2011, v. 21, n. 6, p. 1253, doi. 10.1017/S096012951100020X
- By:
- Publication type:
- Article
Bezpečnost mobilních zařízení.
- Published in:
- Systémová Integrace, 2013, v. 20, n. 3, p. 91
- By:
- Publication type:
- Article
Language Based Information Routing Security: Policy Enforcement.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2009, v. 6, n. 1, p. 91
- By:
- Publication type:
- Article
Challenges in Software Safety for Army Test and Evaluation.
- Published in:
- ITEA Journal of Test & Evaluation, 2009, v. 30, n. 3, p. 409
- By:
- Publication type:
- Article
Certifying a java type resolution function using program transformation, annotation, and reflection.
- Published in:
- Software Quality Journal, 2016, v. 24, n. 1, p. 115, doi. 10.1007/s11219-014-9262-2
- By:
- Publication type:
- Article
QUANTITATIVE ASSESSMENT FOR SOFTWARE SAFETY INTEGRITY LEVEL WITH FUNCTIONAL SAFETY STANDARDS AND RISK COSTS.
- Published in:
- International Journal of Reliability, Quality & Safety Engineering, 2014, v. 21, n. 6, p. -1, doi. 10.1142/S0218539314500302
- By:
- Publication type:
- Article
Problems Related to Increasing the Quality of an Assessment of the Technical State and Remaining Life of Hazardous Production Plants.
- Published in:
- Chemical & Petroleum Engineering, 2015, v. 50, n. 9/10, p. 649, doi. 10.1007/s10556-014-9956-0
- By:
- Publication type:
- Article
Computers II: Insurance.
- Published in:
- Museum Management & Curatorship, 1991, v. 10, n. 1, p. 92, doi. 10.1016/0260-4779(91)90047-2
- By:
- Publication type:
- Article
Debate: Alternative delivery models and corporatization in local government.
- Published in:
- Public Money & Management, 2019, v. 39, n. 1, p. 4, doi. 10.1080/09540962.2019.1537701
- By:
- Publication type:
- Article
BASE PRINCIPAL OF MANAGING OF NETWORK SOFTWARE SECURITY BY VULNERABILITIES DETERMINATION MODEL.
- Published in:
- Computer Science & Telecommunications, 2010, v. 28, n. 5, p. 70
- By:
- Publication type:
- Article
Design of a gamification strategy to intervene in social and human factors associated with software process improvement change resistance.
- Published in:
- IET Software (Wiley-Blackwell), 2021, v. 15, n. 6, p. 428, doi. 10.1049/sfw2.12045
- By:
- Publication type:
- Article
Towards a privacy debt.
- Published in:
- IET Software (Wiley-Blackwell), 2021, v. 15, n. 6, p. 453, doi. 10.1049/sfw2.12044
- By:
- Publication type:
- Article
NATURAL AND QUASI-NATURAL EXPERIMENTS TO EVALUATE CYBERSECURITY POLICIES.
- Published in:
- Journal of International Affairs, 2016, v. 70, n. 1, p. 139
- By:
- Publication type:
- Article
MODEL AND IMPLEMENTATION OF SAFETY CASE CORES.
- Published in:
- Information & Security, 2012, v. 28, n. 2, p. 286, doi. 10.11610/isij.2823
- By:
- Publication type:
- Article