Reliance on skilled developers reduces the return on investment for important software engineering tasks such as establishing program correctness. This position paper introduces a...
: We investigate image steganography under re-encoding of images. After a secret message or a digital watermark is embedded into a jpeg image, quite frequently the image is re-enco...
Abstract. We present an approach to security requirements engineering, which makes use of special kinds of problem frames that serve to structure, characterize, analyze, and solve ...
ion, reviews, rigorous procedures, regression testing, metrics, and so forth) have been helpful, but we are still dealing with an intrinsically unsatisfactory situation. Especially...
For the practical development of provably correct software for embedded systems the close integration of CASE tools and verification tools is required. This paper describes the co...