Figure 6 - uploaded by Muhammad Umair
Content may be subject to copyright.
2. Time monitoring algorithm

2. Time monitoring algorithm

Source publication
Thesis
Full-text available
Software can be made more secure by stipulating and integrating security specifications in the development process. However, guaranteeing the correct implementation of these specifications is a daunting task. In spite of security testing, vulnerabilities can still be present in the deployed software. Especially, the development practice is in favor...