Software development techniques are continuously evolving with the goal of solving the main problems that still affect the building and maintenance of software systems: time, cost...
Software development organisations are paying more and more attention to the usability of their software products. To raise the usability level of the software product, it is nece...
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Abstract. Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster no...