WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Permanent URI for this collectionhttps://hdl.handle.net/11147/7150
Browse
2 results
Search Results
Now showing 1 - 2 of 2
Conference Object Citation - WoS: 3Citation - Scopus: 4Evaluating Software Security Change Requests: a Cosmic-Based Quantification Approach(Institute of Electrical and Electronics Engineers, 2019) Haoues, Mariem; Sellami, Asma; Ben-Abdallah, Hanene; Demirörs, OnurSoftware project scope defines functional and non-functional requirements. These requirements may change to satisfy the customers' needs. However, the control of scope creep represents one of the success keys in software project management. Changes in non-functional requirements affect the ISO/IEC 25010 quality characteristics such as security, portability, etc. Furthermore, some of these quality characteristics may evolve throughout the software life cycle into functional requirements. In this paper, we explore the use of COSMIC method-ISO/IEC 19761 to quantify and evaluate security change requests. Measuring the functional size of security change requests allows stakeholders to make appropriate decisions about whether to accept, defer, or deny the change. © 2019 IEEE.Conference Object Citation - WoS: 7Citation - Scopus: 12Measure of Covertness Based on the Imperfect Synchronization of an Eavesdropper in Random Communication Systems(Institute of Electrical and Electronics Engineers Inc., 2018) Ahmed, Areeb; Savacı, Ferit AcarRandom Communication Systems (RCSs) given in the literature have assumed perfectly synchronized transmitter and receiver. However in this paper, instead of assuming perfect synchronization approach in RCSs, the effects of imperfect synchronization (IS) on Skewed Alpha-Stable Noise Shift Keying (SkaS-NSK) based RCS have been observed through simulations. The Bit Error Rate (BER) performance of the eavesdropper with respect to his synchronization error in SkaS-NSK based RCS, has been analyzed. An expression for the probability of an eavesdropper to decode the binary information (i.e., Eavesdropping Probability) in SkaS-NSK based RCS, has been derived. The criterion (i.e., Covertness Value) to measure the covertness level of RCSs has also been proposed. The BER performance of an eavesdropper provides an approximate margin of synchronization error if it can be overcome by an eavesdropper then he can achieve the decoding (i.e., eavesdropping) process.
