咨询与建议

限定检索结果

文献类型

  • 29 篇 期刊文献
  • 16 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 29 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 8 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 2 篇 机械工程
    • 2 篇 信息与通信工程
    • 2 篇 环境科学与工程(可...
    • 1 篇 电子科学与技术(可...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...

主题

  • 47 篇 data flow diagra...
  • 5 篇 structured analy...
  • 2 篇 data flows
  • 2 篇 simulation
  • 2 篇 software enginee...
  • 2 篇 structured metho...
  • 2 篇 threat modeling
  • 2 篇 information flow
  • 2 篇 sofl
  • 2 篇 entity relations...
  • 2 篇 process modeling
  • 2 篇 requirements eng...
  • 2 篇 spreadsheets
  • 2 篇 systems analysis
  • 2 篇 structured desig...
  • 2 篇 privacy
  • 2 篇 prolog
  • 1 篇 hardware descrip...
  • 1 篇 structure charts
  • 1 篇 gameful experien...

机构

  • 1 篇 univ london roya...
  • 1 篇 trinity coll dub...
  • 1 篇 univ melbourne d...
  • 1 篇 massey univ dept...
  • 1 篇 univ colorado de...
  • 1 篇 narsee monjee in...
  • 1 篇 computing discip...
  • 1 篇 nru hse moscow
  • 1 篇 knime austin tx ...
  • 1 篇 naples univ dipa...
  • 1 篇 cent univ jammu ...
  • 1 篇 knime constance
  • 1 篇 bechtel power co...
  • 1 篇 la salle univ de...
  • 1 篇 noaa fisheries n...
  • 1 篇 konstanz univ co...
  • 1 篇 univ gothenburg ...
  • 1 篇 visma sibiu roma...
  • 1 篇 hosei univ fac c...
  • 1 篇 srge cairo

作者

  • 2 篇 liu sy
  • 2 篇 schneider gerard...
  • 2 篇 van deursen arie
  • 2 篇 hermans felienne
  • 2 篇 pinzger martin
  • 1 篇 fukuzaki t
  • 1 篇 kokovin valery a...
  • 1 篇 baldwin a.n.
  • 1 篇 kolesnik mariia
  • 1 篇 loftus craig
  • 1 篇 protsko lb
  • 1 篇 thorpe a.
  • 1 篇 iovan monica
  • 1 篇 tse th
  • 1 篇 belardo s
  • 1 篇 toetenel hans
  • 1 篇 hassanien aboul ...
  • 1 篇 ghiran ana-maria
  • 1 篇 miyamoto k
  • 1 篇 tong xin

语言

  • 41 篇 英文
  • 6 篇 其他
检索条件"主题词=Data flow Diagrams"
47 条 记 录,以下是1-10 订阅
排序:
A Knowledge Graph Approach to Cyber Threat Mitigation Derived from data flow diagrams  24
A Knowledge Graph Approach to Cyber Threat Mitigation Derive...
收藏 引用
International Conference on Automation, Quality and Testing, Robotics (AQTR)
作者: Chis, Andrei Stoica, Oliviu Ionut Ghiran, Ana-Maria Buchmann, Robert Andrei Babes Bolyai Univ Fac Econ & Business Adm OMILAB FSEGA Cluj Napoca Romania Babes Bolyai Univ Fac Econ & Business Adm Cluj Napoca Romania
data flow diagrams (DFD) have proven effective in designing and analyzing the flow of data in enterprise systems. They serve as indispensable tools for enterprises that are undergoing transition to cloud services. DFD... 详细信息
来源: 评论
Transforming data flow diagrams for Privacy Compliance  9th
Transforming Data Flow Diagrams for Privacy Compliance
收藏 引用
9th International Conference on Model-Driven Engineering and Software Development (MODELSWARD)
作者: Alshareef, Hanaa Stucki, Sandro Schneider, Gerardo Chalmers Univ Technol Gothenburg Sweden Univ Gothenburg Gothenburg Sweden
Most software design tools, as for instance data flow diagrams (DFDs), are focused on functional aspects and cannot thus model non-functional aspects like privacy. In this paper, we provide an explicit algorithm and a... 详细信息
来源: 评论
Towards data Science Design Patterns  1
收藏 引用
21st International Symposium on Intelligent data Analysis (IDA)
作者: Berthold, Michael R. Brookhart, Dashiell Gerber, Schalk Hayasaka, Satoru Widmann, Maarit KNIME Zurich Switzerland KNIME Austin TX USA KNIME Constance Germany Konstanz Univ Constance Germany
We propose data flow diagrams to model data science design patterns and demonstrate, using a number of explanatory patterns, how they can be used to explain and document data science best practices, aid data science e... 详细信息
来源: 评论
Application TRIKE Methodology When Modeling Threats to APCs Information Security
Application TRIKE Methodology When Modeling Threats to APCs ...
收藏 引用
International Russian Automation Conference (RusAutoCon)
作者: Chernov, D. Tula State Univ 92 Lenina Ave Tula 300012 Russia
In the modern world automation technologies of industrial processes have found wide application. Automated process control systems have become an important part of enterprises that operate in different economic fields... 详细信息
来源: 评论
Using an Online Serious Game to Teach Basic Programming Concepts and Facilitate Gameful Experiences for High School Students
收藏 引用
IEEE ACCESS 2021年 9卷 12567-12578页
作者: Montes, Hernan Hijon-Neira, Raquel Perez-Marin, Diana Montes, Sergio Univ Rey Juan Carlos Comp Sci Dept Madrid 28933 Spain Univ Rey Juan Carlos Dept Comp Sci Madrid 28933 Spain Univ Fuerzas Armadas ESPE Comp Sci Dept Sangolqui 171103 Ecuador
Teaching programming to pre-university students has attracted a great deal of attention in the last years. The benefits of teaching programming before University have been investigated by taking several approaches to ... 详细信息
来源: 评论
A hybrid approach for energy-efficient routing in IoT using duty cycling and improved ant colony
收藏 引用
IET COMMUNICATIONS 2022年 第0期
作者: Rana, Bharti Singh, Yashwant Singh, Pradeep Kumar Ghafoor, Kayhan Zrar Shrestha, Sachin Cent Univ Jammu Dept Comp Sci & Informat Technol Jammu India Narsee Monjee Inst Management Studies NMIMS Sch Technol Management & Engn STME Chandigarh 160014 India Knowledge Univ Erbil Iraq Pokhara Univ Nepal Engn Coll Dept ECE Pokhara Nepal Pokhara Univ Nepal Engn Coll Dept ECE Pokhara 33700 Nepal Cent Univ Jammu Dept Comp Sci & Informat Technol Jammu 180001 J&K India Narsee Monjee Inst ofManagement Studies NMIMS Sch Technol Management & Engn STME Chandigarh 160014 India
The promising technology of IoT in the fourth industrial revolution connects everything to the Internet in the digital world of the current era. Though the gigantic connectivity among things through the blend of multi... 详细信息
来源: 评论
Adopting threat modelling in agile software development projects
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2022年 183卷 111090-111090页
作者: Bernsmed, Karin Cruzes, Daniela Soares Jaatun, Martin Gilje Iovan, Monica SINTEF Digital Trondheim Norway Visma Sibiu Romania
The goal of secure software engineering is to create software that keeps performing as intended, even when exposed to attacks. Threat modelling is considered to be a key activity to reach this goal, but has turned out... 详细信息
来源: 评论
An Ontology for Representing and Annotating data flows to Facilitate Compliance Verification  13
An Ontology for Representing and Annotating Data Flows to Fa...
收藏 引用
13th IEEE International Conference on Research Challenges in Information Science (IEEE RCIS)
作者: Debruyne, Christophe Riggio, Jonathan De Troyer, Olga O'Sullivan, Declan Trinity Coll Dublin Dublin Ireland Vrije Univ Brussel Brussels Belgium
In this paper, we argue that there is a gap to be bridged between the development and maintenance of services and the various internal and external policies that emerge and evolve outside of these systems. To bridge t... 详细信息
来源: 评论
Calibration and Monitoring of IoT Devices by Means of Embedded Scientific Visualization Tools  18th
Calibration and Monitoring of IoT Devices by Means of Embedd...
收藏 引用
18th International Conference on Computational Science (ICCS)
作者: Ryabinin, Konstantin Chuprina, Svetlana Kolesnik, Mariia Perm State Univ Bukireva Str 15 Perm 614990 Russia Perm Reg Museum Branch Museum Permian Antiqu Monastyrskaya Str 11 Perm 614000 Russia
In the paper we propose ontology based scientific visualization tools to calibrate and monitor various IoT devices in a uniform way. We suggest using ontologies to describe associated controllers, chips, sensors and r... 详细信息
来源: 评论
A Behavioral Action Sequences Process Design  2nd
收藏 引用
2nd International Conference on Advanced Intelligent Systems and Informatics (AISI)
作者: Kilany, Moataz Hassanien, Aboul Ella Badr, Amr Tsai, Pei-Wei Pan, Jeng-Shyang Minia Univ Fac Comp & Informat El Minia Egypt Cairo Univ Fac Comp & Informat Giza Egypt Beni Suef Univ Fac Comp & Informat Bani Suwayf Egypt Fujian Univ Technol Fujian Prov Key Lab Big Data Min & Applicat Fuzhou Peoples R China SRGE Cairo Egypt
Modeling human actions in a format that is suitable for computer systems to understand is a target for behavior analysis systems. This work introduces a high level design for a behavioral analysis system based on acti... 详细信息
来源: 评论