A systematic mapping study on requirements engineering in software ecosystems

A Vegendla, AN Duc, S Gao, G Sindre - Journal of Information …, 2018 - igi-global.com
Software ecosystems (SECOs) and open innovation processes have been claimed as a way
forward for the software industry. A proper understanding of requirements is as important for …

Understanding vulnerabilities in plugin-based web systems: an exploratory study of wordpress

O Mesa, R Vieira, M Viana, VHS Durelli… - Proceedings of the …, 2018 - dl.acm.org
A common software product line strategy involves plugin-based web systems that support
simple and quick incorporation of custom behaviors. As a result, they have been widely …

A demand-side viewpoint to software vulnerabilities in wordpress plugins

J Ruohonen - Proceedings of the 23rd International Conference on …, 2019 - dl.acm.org
WordPress has long been the most popular content management system (CMS). This CMS
powers millions and millions of websites. Although WordPress has had a particularly bad …

Cybersecurity Guide for SMEs: Protecting Small and Medium-Sized Enterprises in the Digital Era

A Papathanasiou, G Liontos, A Katsouras… - Journal of Information …, 2024 - scirp.org
Small and Medium-sized Enterprises (SMEs) are considered the backbone of global
economy, but they often face cyberthreats which threaten their financial stability and …

Achilles' heel of plug-and-Play software architectures: a grounded theory based approach

JCS Santos, A Sejfia, T Corrello… - Proceedings of the …, 2019 - dl.acm.org
Through a set of well-defined interfaces, plug-and-play architectures enable additional
functionalities to be added or removed from a system at its runtime. However, plug-ins can …

[PDF][PDF] Vulnerability exploration and understanding services

K Darabal - 2018 - unsworks.unsw.edu.au
As a response to the major vulnerability-enabled cyber attacks to both organisations in the
private sector (eg, Yahoo and Sony Pictures) and the government (eg, US Democratic …

Certified multimedia statement with WebRTC and microservices

A Bouabdallah, S El Jaouhari - 2016 Asia Pacific Conference …, 2016 - ieeexplore.ieee.org
The articulation between WebRTC and microservices deserves more attention and we
argue that it could be highly promising. We illustrate it by the introduction, the analysis and …

An investigation of software vulnerabilities in open source software projects using data from publicly-available online sources.

SM Murshed - 2017 - repository.library.carleton.ca
Software vulnerabilities is an active area of research, but little is known about how publicly-
observable properties of open source software projects and developer communities relate to …

[PDF][PDF] Proactive Mitigation of Vulnerabilities in Plugin-based Web Systems

OM Rodríguez - 2019 - maxwell.vrac.puc-rio.br
Web Systems. Rio de Janeiro, 2019. 73p. Dissertação de mestrado–Departamento de
Informática, Pontifícia Universidade Católica do Rio de Janeiro. A common software product …

[图书][B] Architectural Vulnerabilities in Plug-and-Play Systems

T Corrello - 2018 - search.proquest.com
Plug-and-play architectures enhance systems' extensibility by providing a framework that
enables additional functionalities to be added or removed from the system at their runtime …