Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,084,880 papers from all fields of science
Search
Sign In
Create Free Account
Secure by design
Known as:
SBD
, Security by design
Secure by design, in software engineering, means that the software has been designed from the ground up to be secure. Malicious practices are taken…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Buffer overflow
C standard library
Call stack
Cyber security standards
Expand
Broader (3)
Computer security
Software development process
Software quality
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Helix SandBox: An Open Platform to Fast Prototype Smart Environments Applications
F. Cabrini
,
Albérico de Barros Castro Filho
,
F. V. Filho
,
S. Kofuji
,
Angelo Rafael Lunardelli Pucci Moura
IEEE 1st Sustainable Cities Latin America…
2019
Corpus ID: 208208342
This paper presents the Helix SandBox, an open platform for quick prototyping of smart environment applications. Its architecture…
Expand
2018
2018
Security Perspective in RAMI 4.0
Amr I. Elkhawas
,
Marianne A. Azer
International Conference on Communication and…
2018
Corpus ID: 61810863
Cloud Computing, Internet of Things (IoT) are the main technologies contributing to the adoption of the fourth revolution in…
Expand
Review
2017
Review
2017
A Survey on Robust Interference Management in Wireless Networks
Jaber Kakar
,
A. Sezgin
Entropy
2017
Corpus ID: 26153109
Recent advances in the characterization of fundamental limits on interference management in wireless networks and the discovery…
Expand
2017
2017
SLA-Based Continuous Security Assurance in Multi-Cloud DevOps
Erkuden Rios
,
M. Rak
,
Eider Iturbe
,
Wissam Mallouli
SecSE@ESORICS
2017
Corpus ID: 4950814
The MUSA project leading to this paper has received funding from the European Union’s Horizon 2020 research and innovation…
Expand
2015
2015
Cyber (In-)security of Industrial Control Systems: A Societal Challenge
E. Luiijf
International Conference on Computer Safety…
2015
Corpus ID: 30070682
Our society and its citizens increasingly depend on the undisturbed functioning of critical infrastructures CI, their products…
Expand
2015
2015
Industrie 4.0 with Ms-excel?
A. Fricke
,
J. Schöneberger
2015
Corpus ID: 55745628
Industrie 4.0 is a project in the high-tech strategy of the German government to promote the computerization of traditional…
Expand
Review
2014
Review
2014
A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications
Yosra Ben Saied
,
Alexis Olivereau
,
D. Zeghlache
,
M. Laurent-Maknavicius
Journal of Network and Computer Applications
2014
Corpus ID: 12144767
2013
2013
Solution Monitoring Evaluated by Proliferation Risk Assessment and Fuzzy Optimization Analysis for Safeguards in a Reprocessing Process
Mitsutoshi Suzuki
,
Norichika Terao
2013
Corpus ID: 55246918
Solution monitoring (SM) has been used in a nuclear reprocessing plant as an additional measure to provide assurance that the…
Expand
2013
2013
Enhancing Multi-tenancy Security in the Cloud IaaS Model over Public Deployment
Hussain Aljahdali
,
P. Townend
,
Jie Xu
IEEE Seventh International Symposium on Service…
2013
Corpus ID: 11782543
Cloud Computing can be seen as an instance of Computing as a Utility, where customers utilize the concept of "pay-as-you-go" for…
Expand
Review
2012
Review
2012
Pioneering Role of IRIS in the Resurgence of Small Modular Reactors*
B. Petrovic
,
M. Ricotti
,
S. Monti
,
N. Čavlina
,
H. Ninokata
2012
Corpus ID: 59490845
Abstract This paper presents an overview of the first 10 years of the IRIS project, summarizing its main technical achievements…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE