• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • Tagged with
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Investigating the Application of TDD Practice in Large-Scale Industries

DANTULURI, PAVAN KUMAR VARMA, NETHI, RAMAKRISHNA January 2018 (has links)
Context: Developer’s within software companies work chosen choice of software development process. Choice of a particular Software Development Process impacts the work environment, end-product and might also have financial risks due to delay in delivering in the final software product. Objectives: we are investigating if the TDD could impact/applicable in large-scale industries. To achieve that we first identify the strengths and challenges while using TDD in large-scale industries. Identify what modifications can enhance the impact of TDD in large-Scale industries. Methods: Systematic Literature Review (SLR) has been used to investigate the application of TDD in large-scale industries. Using the info from SLR we conducted an online survey for validating the results obtained from SLR. As a last step we have conducted semi structured interviews to gather information from developers across industries practicing and practiced TDD. The data from the qualitative and quantitative methods is triangulated by identifying the strengths, challenges and modifications in applying TDD to large-scale industries. Results: The findings from our SLR, results validated from Survey and responses from interview participants show that TDD have both strengths, Challenges and modifications. Conclusions: Some challenges encountered when using TDD in large-scale industries are Negative test cases, linking test case modules of several developers, Communication, Overall idea about project, lack of TDD knowledge for developers practicing TDD, also lack of automation tools supporting the development of unit test-cases.
2

Investigating Security Issues in Industrial IoT: A Systematic Literature Review

Milinic, Vasilije January 2021 (has links)
The use of Internet-of-Things (IoT) makes it possible to inter-connect Information Technology (IT) and Operational Technology (OT) into a completely new system. This convergence is often known as Industrial IoT (IIoT). IIoT brings a lot of benefits to industrial assets, such as improved efficiency and productivity, reduced cost, and depletion of human error. However, the high inter-connectivity opens new possibilities for cyber incidents. These incidents can cause major damage like halting of production on the manufacturing line, or catastrophic havoc to companies, communities, and countries causing power outages, floods, and fuel shortages. Such incidents are important to be predicted, stopped, or alleviated at no cost. Moreover, these incidents are a great motive for researchers and practitioners to investigate known security problems and find potential moderation strategies.  In this thesis work, we try to identify what types of IIoT systems have been investigated in the literature. We seek out to find if software-related issues can yield security problems. Also, we make an effort to perceive what are the proposed methods to mitigate the security threats.We employ the systematic literature review (SLR) methodology to collect this information. The results are gathered from papers published in the last five years and they show an increased interest in research in this domain. We find out software vulnerabilities are a concern for IIoT systems, mainly firmware vulnerabilities and buffer overflows, and there are a lot of likely attacks that can cause damage, mostly injection and DDoS attacks. There are a lot of different solutions which offer the possibility to stop the identified problems and we summarize them. Furthermore, the research gap considering the update process in these systems and devices, as well as a problem with the unsupervised software supply chain is identified.
3

A systematic literature review on cloud of things vulnerability

Pirahandeh, Mehdi January 2018 (has links)
Every day, a new publication on information systems highlights about Cloud of Things (CoT) vulnerabilities; in most of these publications, vulnerability is quoted as the most substantial barrier for CoT realization. However, formulating a justifiable appraisement of the actual vulnerability impact on CoT is difficult because in many of these publications, the term security “vulnerability” is stated incorrectly as a threat or the publication does not discuss CoT-specific vulnerabilities. To achieve a well-founded understanding of CoT vulnerabilities, this literature review identifies the major vulnerabilities and their security controls and to identify any gaps for future research. A systematic literature review (SLR) approach using 58 articles is considered for this review. Based on this review, a taxonomy is created to classify the existing CoT vulnerabilities and security controls. This literature review identifies and discusses similarities and differences among various vulnerability issues and solutions. Most reviews previously performed were limited to the threats to the application interface and virtualization level, whereas this SLR thesis expand to the vulnerabilities in connectivity and things level of CoT. This study emphasize the importance of a clear definition of cloud of things vulnerabilities and to facilitate better understanding and assessment of CoT vulnerabilities to build more secure systems.

Page generated in 0.0896 seconds