SOFTWARE SECURITY TESTING PROCESS
Published In: INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING AND COMMUNICATION ENGINEERING
Author(s): RAEES AHMAD KHAN , SUHEL AHMAD KHAN
Abstract: Security testing is an integral part of risk management process and executives realize the benefits of an independent security test process. It is highly desirable to optimize the security test activities for a fast time-to-market while delivering a product that meets security expectation. Software security test process elaborates various testing activities and describes which activity is to be carried out when. Given the need and significance of phased approach of security testing, this article proposes a prescriptive framework elaborating security testing activities to be carried out while integrating it within the development life cycle.
- Publication Date: 21-Apr-2013
- DOI: 10.15224/978-981-07-6184-4-09
- Views: 0
- Downloads: 0
SEQUENCED QUEUE BASED ROUTING ALGORITHM (SQRA) FOR DETECTION AND CORRECTION OF GREY HOLE ATTACK BY IMPLEMENTING IDS
Published In: INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING AND COMMUNICATION ENGINEERING
Author(s): SHIVANI SHARMA , TANU PREET SINGH
Abstract: Mobile Ad hoc Networks is a collection of wireless mobile nodes, which form temporary networks without relying on any existing infrastructure or centralized administration or standard support services regularly available in wide area networks to which the host may normally be connected. In this paper we proposed sequenced Queue based Routing Algorithm (SQRA) for Detection and Correction of Grey Hole attack by Implementing Intrusion Detection System.
- Publication Date: 21-Apr-2013
- DOI: 10.15224/978-981-07-6184-4-10
- Views: 0
- Downloads: 0