Accès libre

Development of computer application system and database testing based on data encryption technology

  
27 déc. 2023
À propos de cet article

Citez
Télécharger la couverture

Gobert, M., Nagy, C., Rocha, H., Demeyer, S., & Cleve, A. (2023). Best practices of testing database manipulation code. Information systems. Search in Google Scholar

Raksawat, C., & Charoenporn, P. (2021). Software testing system development based on iso 29119. Engineering and Technology Publishing(2). Search in Google Scholar

Villani, EmiliaPontes, Rodrigo PastlCoracini, Guilherme KisseloflAmbrosio, Ana Maria. (2019). Integrating model checking and model based testing for industrial software development. Computers in Industry, 104. Search in Google Scholar

Martinez-Ledezma, J. A., Barron-Zambrano, J. H., Diaz-Manriquez, A., Elizondo-Leal, J. C., & Rostro-Gonzalez, H. (2020). Versatile implementation of a hardware–software architecture for development and testing of brain–computer interfaces. International Journal of Advanced Robotic Systems, 17(6), 172988142098025. Search in Google Scholar

Minamino, Y., Inoue, S., & Yamada, S. (2016). Nhpp-based change-point modeling for software reliability assessment and its application to software development management. Annals of Operations Research, 244(1), 1-17. Search in Google Scholar

Kaliraj, M. R. S., & Bharathi, A. (2018). Path testing based reliability analysis framework of component based software system. Measurement. Search in Google Scholar

Subramanian, G. H., Pendharkar, P. C., & Pai, D. R. (2017). An examination of determinants of software testing and project management effort. Journal of computer information systems(2). Search in Google Scholar

Nath, P., Mushahary, J. R., Roy, U., Brahma, M., & Singh, P. K. (2023). Ai and blockchain-based source code vulnerability detection and prevention system for multiparty software development. Computers & Electrical Engineering, 106, 108607-. Search in Google Scholar

Burnashev, R. A., & Enikeev, A. I. (2016). Structuring of textual data and its processing with database management systems in the development of computer assisted testing systems for students. International journal of soft computing, 11(7), 444-447. Search in Google Scholar

Bukanin, V. A., Ivanov, A. N., & Boriskina, A. V. (2020). Experience of the distance testing system development and operation. Journal of Physics: Conference Series, 1691(1), 012170 (6pp). Search in Google Scholar

Kaydani, H., Mohebbi, A., & Baghaie, A. (2012). Neural fuzzy system development for theprediction of permeability from wireline databased on fuzzy clustering. Petroleum Science and Technology(17/20), 30. Search in Google Scholar

Budati, A. K., Snv, G., Cherukupalli, K., Anil, K. P., & Venkata, K. M. T. (2021). High speed data encryption technique with optimized memory based rsa algorithm for communications. Circuit World, ahead-of-print(ahead-of-print). Search in Google Scholar

Lee, Y. U. (2020). Secure visible light communication technique based on asymmetric data encryption for 6g communication service. Electronics, 9. Search in Google Scholar

Arulananth, T. S., Baskar, M., Anbarasu, V., Thiagarajan, R., Rajendran, T., & Balaji, A. (2021). Multi party secure data access management in cloud using user centric block chain data encryption. Pattern recognition letters(152-Dec.). Search in Google Scholar

Kumar, P., & Bhatt, A. K. (2020). Enhancing multi-tenancy security in the cloud computing using hybrid ecc-based data encryption approach. IET Communications, 14(18), 3212-3222. Search in Google Scholar

Chen, Y., Zhang, Y., Hu, G., & He, P. (2020). Database-assisted dynamic spectrum allocation method with spectrum security. International Journal of Performability Engineering(12), 16. Search in Google Scholar

A, A. Y., & B, N. T. A. D. (2019). Dynamically detecting security threats and updating a signature-based intrusion detection system’s database. Procedia Computer Science, 159, 1507-1516. Search in Google Scholar