Now showing items 1-3 of 3
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development
This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been ...
Blocking Epidemics Propagation in Vehicular Networks
The propagation of software viruses over a vehicular network where vehicles communicate via V2V links can have disastrous effects for the vehicles themselves and the ad hoc network. Here, we propose a simple distributed ...
Cyber security of critical infrastructures
Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved ...