A systematic mapping study on requirements engineering in software ecosystems
Software ecosystems (SECOs) and open innovation processes have been claimed as a way
forward for the software industry. A proper understanding of requirements is as important for …
forward for the software industry. A proper understanding of requirements is as important for …
Understanding vulnerabilities in plugin-based web systems: an exploratory study of wordpress
O Mesa, R Vieira, M Viana, VHS Durelli… - Proceedings of the …, 2018 - dl.acm.org
A common software product line strategy involves plugin-based web systems that support
simple and quick incorporation of custom behaviors. As a result, they have been widely …
simple and quick incorporation of custom behaviors. As a result, they have been widely …
A demand-side viewpoint to software vulnerabilities in wordpress plugins
J Ruohonen - Proceedings of the 23rd International Conference on …, 2019 - dl.acm.org
WordPress has long been the most popular content management system (CMS). This CMS
powers millions and millions of websites. Although WordPress has had a particularly bad …
powers millions and millions of websites. Although WordPress has had a particularly bad …
Cybersecurity Guide for SMEs: Protecting Small and Medium-Sized Enterprises in the Digital Era
A Papathanasiou, G Liontos, A Katsouras… - Journal of Information …, 2024 - scirp.org
Small and Medium-sized Enterprises (SMEs) are considered the backbone of global
economy, but they often face cyberthreats which threaten their financial stability and …
economy, but they often face cyberthreats which threaten their financial stability and …
Achilles' heel of plug-and-Play software architectures: a grounded theory based approach
JCS Santos, A Sejfia, T Corrello… - Proceedings of the …, 2019 - dl.acm.org
Through a set of well-defined interfaces, plug-and-play architectures enable additional
functionalities to be added or removed from a system at its runtime. However, plug-ins can …
functionalities to be added or removed from a system at its runtime. However, plug-ins can …
[PDF][PDF] Vulnerability exploration and understanding services
K Darabal - 2018 - unsworks.unsw.edu.au
As a response to the major vulnerability-enabled cyber attacks to both organisations in the
private sector (eg, Yahoo and Sony Pictures) and the government (eg, US Democratic …
private sector (eg, Yahoo and Sony Pictures) and the government (eg, US Democratic …
Certified multimedia statement with WebRTC and microservices
A Bouabdallah, S El Jaouhari - 2016 Asia Pacific Conference …, 2016 - ieeexplore.ieee.org
The articulation between WebRTC and microservices deserves more attention and we
argue that it could be highly promising. We illustrate it by the introduction, the analysis and …
argue that it could be highly promising. We illustrate it by the introduction, the analysis and …
An investigation of software vulnerabilities in open source software projects using data from publicly-available online sources.
SM Murshed - 2017 - repository.library.carleton.ca
Software vulnerabilities is an active area of research, but little is known about how publicly-
observable properties of open source software projects and developer communities relate to …
observable properties of open source software projects and developer communities relate to …
[PDF][PDF] Proactive Mitigation of Vulnerabilities in Plugin-based Web Systems
OM Rodríguez - 2019 - maxwell.vrac.puc-rio.br
Web Systems. Rio de Janeiro, 2019. 73p. Dissertação de mestrado–Departamento de
Informática, Pontifícia Universidade Católica do Rio de Janeiro. A common software product …
Informática, Pontifícia Universidade Católica do Rio de Janeiro. A common software product …
[图书][B] Architectural Vulnerabilities in Plug-and-Play Systems
T Corrello - 2018 - search.proquest.com
Plug-and-play architectures enhance systems' extensibility by providing a framework that
enables additional functionalities to be added or removed from the system at their runtime …
enables additional functionalities to be added or removed from the system at their runtime …