You are on page 1of 2

Reliability

Haoues, M., Sellami, A., Ben-Abdallah, H., & Cheikhi, L. (2017). A guideline for software

architecture selection based on ISO 25010 quality related characteristics. International

Journal of Systems Assurance Engineering and Management.

https://doi.org/10.1007/s13198-016-0546-8

Portability

Fang, J., Zhao, Z., Wen, C., & Wang, R. (2017). Design and performance attributes driving

mobile travel application engagement. International Journal of Information Management.

https://doi.org/10.1016/j.ijinfomgt.2017.03.003

Nayebi, F., Desharnais, J. M., & Abran, A. (2012). The state of the art of mobile application

usability evaluation. 2012 25th IEEE Canadian Conference on Electrical and Computer

Engineering: Vision for a Greener Future, CCECE 2012.

https://doi.org/10.1109/CCECE.2012.6334930

Security

Samtani, S., Chinn, K., Larson, C., & Chen, H. (2016). AZSecure Hacker Assets Portal: Cyber

threat intelligence and malware analysis. IEEE International Conference on Intelligence

and Security Informatics: Cybersecurity and Big Data, ISI 2016.

https://doi.org/10.1109/ISI.2016.7745437

Ding, X., Yang, Y., & Deng, R. H. (2011). Database access pattern protection without full-

shuffles. IEEE Transactions on Information Forensics and Security.


https://doi.org/10.1109/TIFS.2010.2101062

Samtani, S., Chinn, K., Larson, C., & Chen, H. (2016). AZSecure Hacker Assets Portal: Cyber

threat intelligence and malware analysis. IEEE International Conference on Intelligence

and Security Informatics: Cybersecurity and Big Data, ISI 2016.

https://doi.org/10.1109/ISI.2016.7745437

You might also like