The objective of this article is to describe a process methodology to increase security inside secure military self-protected software. Self-protected software is vulnerable to threats, most dependant on the software user. Therefore, detection by self-protected software of the current user is very important. The methodology includes three phases: detection of user, analysis of current state and reaction actions. The detection phase is comprised of assessing geographic location, time at present location and determining user kind (friend or foe). Analysis phase consists of analysing if self-protected software should be at present location, predicting future locations and assessing the location level of threat. Reaction phase includes determin...
Development of military software is mainly done by large companies specialized on the military domai...
Abstract: Electronic policing of an environment is becoming more appreciated to curb indiscipline, u...
The changed role of the military in contemporary conflicts and new tendencies in Rade V. Slavković a...
The software at the heart of many military systems is traditionally defended using the network secur...
Self-protecting software systems are a class of autonomic systems capable of detecting and mitigatin...
Today's software landscape features a high degree of complexity, frequent changes in requirements an...
Today’s software landscape features a high degree of complexity, frequent change and many uncertaint...
Especially in software development information security is an everlasting race against changing thre...
The advancement of technology has made the development of software applications become unstoppabl...
Businesses and governments that deploy and operate IT (information technology) systems continue to s...
This paper contains a description of programs currently available for detecting physiological change...
Often security incidents that have the object or use the software as a means of causing serious dam...
Let’s talk about security at a private access place taking into account the amount of effort one wan...
The object of the research is the system of information security of the state. Investigated proble...
More and more businesses and services are depending on software to run their daily operations and bu...
Development of military software is mainly done by large companies specialized on the military domai...
Abstract: Electronic policing of an environment is becoming more appreciated to curb indiscipline, u...
The changed role of the military in contemporary conflicts and new tendencies in Rade V. Slavković a...
The software at the heart of many military systems is traditionally defended using the network secur...
Self-protecting software systems are a class of autonomic systems capable of detecting and mitigatin...
Today's software landscape features a high degree of complexity, frequent changes in requirements an...
Today’s software landscape features a high degree of complexity, frequent change and many uncertaint...
Especially in software development information security is an everlasting race against changing thre...
The advancement of technology has made the development of software applications become unstoppabl...
Businesses and governments that deploy and operate IT (information technology) systems continue to s...
This paper contains a description of programs currently available for detecting physiological change...
Often security incidents that have the object or use the software as a means of causing serious dam...
Let’s talk about security at a private access place taking into account the amount of effort one wan...
The object of the research is the system of information security of the state. Investigated proble...
More and more businesses and services are depending on software to run their daily operations and bu...
Development of military software is mainly done by large companies specialized on the military domai...
Abstract: Electronic policing of an environment is becoming more appreciated to curb indiscipline, u...
The changed role of the military in contemporary conflicts and new tendencies in Rade V. Slavković a...