Advancing database security: a comprehensive systematic mapping study of potential challenges

A Iqbal, SU Khan, M Niazi, M Humayun, NU Sama… - Wireless …, 2023 - Springer
The value of data to a company means that it must be protected. When it comes to
safeguarding their local and worldwide databases, businesses face a number of challenges …

Analysis of Strategies for the Integration of Security Practices in Agile Software Development: A Sustainable SME Approach

Y Valdés-Rodríguez, J Hochstetter-Diez… - IEEE …, 2024 - ieeexplore.ieee.org
Incorporating security into software development in small and medium-sized enterprises
(SMEs) is an increasingly relevant challenge and a crucial necessity, especially in an …

Enhancing cybersecurity capability investments: Evidence from an experiment

A Pigola, PR Da Costa, M Ferasso, LFC da Silva - Technology in Society, 2024 - Elsevier
In recent years, investments in cybersecurity capabilities (CC) have emerged as an essential
practice in reducing cyberattacks and optimizing the usage of technologies. Therefore …

Secure global software development: a practitioners' perspective

M Humayun, M Niazi, M Assiri, M Haoues - Applied Sciences, 2023 - mdpi.com
Global software development (GSD) is rapidly becoming standard practice in the software
industry due to its many potential benefits. However, one of the biggest challenges in GSD …

Insider threat detection using supervised machine learning algorithms

P Manoharan, J Yin, H Wang, Y Zhang… - Telecommunication …, 2023 - Springer
Insider threats refer to abnormal actions taken by individuals with privileged access,
compromising system data's confidentiality, integrity, and availability. They pose significant …

Improving the safety and security of software systems by mediating SAP verification

MF Almufareh, M Humayun - Applied Sciences, 2023 - mdpi.com
Security and performance (SAP) are two critical NFRs that affect the successful completion
of software projects. Organizations need to follow the practices that are vital to SAP …

Dynamic capabilities in cybersecurity intelligence: A meta-synthesis to enhance protection against cyber threats

A Pigola, PR Da Costa - … of the Association for Information Systems, 2023 - aisel.aisnet.org
Advanced cybersecurity threats with automated capabilities are on the rise in industries such
as finance, healthcare, technology, retail, telecoms, and transportation, as well as …

Security risks in the software development lifecycle: A review

D Odera, M Otieno, JE Ounza - World Journal of Advanced Engineering …, 2023 - wjaets.com
Software security is one of the most critical concerns in modern software development,
especially in safety-critical systems whose failure can lead to environmental damage …

A secure network path of implantable medical devices for detecting the vulnerabilities using hybrid DBNF network

C Thyagarajan, SV Bhanu, S Suthir - Biomedical Signal Processing and …, 2024 - Elsevier
IoT is complicated as it contains a huge number of devices which saves data and promotes
functionality of each device. Generally, such models include real-time functioning as it is a …

OWASP-Based Assessment of Web Application Security

A Khanum, S Qadir, S Jehan - 2023 18th International …, 2023 - ieeexplore.ieee.org
Inadequate vulnerability assessment of web applications during the Software Development
Life Cycle (SDLC) leads to security breaches posing a severe threat to digital transformation …