Advancing database security: a comprehensive systematic mapping study of potential challenges
The value of data to a company means that it must be protected. When it comes to
safeguarding their local and worldwide databases, businesses face a number of challenges …
safeguarding their local and worldwide databases, businesses face a number of challenges …
Analysis of Strategies for the Integration of Security Practices in Agile Software Development: A Sustainable SME Approach
Y Valdés-Rodríguez, J Hochstetter-Diez… - IEEE …, 2024 - ieeexplore.ieee.org
Incorporating security into software development in small and medium-sized enterprises
(SMEs) is an increasingly relevant challenge and a crucial necessity, especially in an …
(SMEs) is an increasingly relevant challenge and a crucial necessity, especially in an …
Enhancing cybersecurity capability investments: Evidence from an experiment
In recent years, investments in cybersecurity capabilities (CC) have emerged as an essential
practice in reducing cyberattacks and optimizing the usage of technologies. Therefore …
practice in reducing cyberattacks and optimizing the usage of technologies. Therefore …
Secure global software development: a practitioners' perspective
Global software development (GSD) is rapidly becoming standard practice in the software
industry due to its many potential benefits. However, one of the biggest challenges in GSD …
industry due to its many potential benefits. However, one of the biggest challenges in GSD …
Insider threat detection using supervised machine learning algorithms
Insider threats refer to abnormal actions taken by individuals with privileged access,
compromising system data's confidentiality, integrity, and availability. They pose significant …
compromising system data's confidentiality, integrity, and availability. They pose significant …
Improving the safety and security of software systems by mediating SAP verification
MF Almufareh, M Humayun - Applied Sciences, 2023 - mdpi.com
Security and performance (SAP) are two critical NFRs that affect the successful completion
of software projects. Organizations need to follow the practices that are vital to SAP …
of software projects. Organizations need to follow the practices that are vital to SAP …
Dynamic capabilities in cybersecurity intelligence: A meta-synthesis to enhance protection against cyber threats
A Pigola, PR Da Costa - … of the Association for Information Systems, 2023 - aisel.aisnet.org
Advanced cybersecurity threats with automated capabilities are on the rise in industries such
as finance, healthcare, technology, retail, telecoms, and transportation, as well as …
as finance, healthcare, technology, retail, telecoms, and transportation, as well as …
Security risks in the software development lifecycle: A review
D Odera, M Otieno, JE Ounza - World Journal of Advanced Engineering …, 2023 - wjaets.com
Software security is one of the most critical concerns in modern software development,
especially in safety-critical systems whose failure can lead to environmental damage …
especially in safety-critical systems whose failure can lead to environmental damage …
A secure network path of implantable medical devices for detecting the vulnerabilities using hybrid DBNF network
C Thyagarajan, SV Bhanu, S Suthir - Biomedical Signal Processing and …, 2024 - Elsevier
IoT is complicated as it contains a huge number of devices which saves data and promotes
functionality of each device. Generally, such models include real-time functioning as it is a …
functionality of each device. Generally, such models include real-time functioning as it is a …
OWASP-Based Assessment of Web Application Security
A Khanum, S Qadir, S Jehan - 2023 18th International …, 2023 - ieeexplore.ieee.org
Inadequate vulnerability assessment of web applications during the Software Development
Life Cycle (SDLC) leads to security breaches posing a severe threat to digital transformation …
Life Cycle (SDLC) leads to security breaches posing a severe threat to digital transformation …