[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

[HTML][HTML] Software compliance requirements, factors, and policies: A systematic literature review

M Mubarkoot, J Altmann, M Rasti-Barzoki, B Egger… - Computers & …, 2023 - Elsevier
Background Recent statistics reveal that 56% of software attacks are caused by insider
negligence and 26% are caused by malicious insiders. They also show that 67% of …

Synthetic minority oversampling technique for optimizing classification tasks in botnet and intrusion-detection-system datasets

D Gonzalez-Cuautle, A Hernandez-Suarez… - Applied Sciences, 2020 - mdpi.com
Presently, security is a hot research topic due to the impact in daily information infrastructure.
Machine-learning solutions have been improving classical detection practices, but detection …

Security and privacy of QR code applications: a comprehensive study, general guidelines and solutions

HAM Wahsheh, FL Luccio - Information, 2020 - mdpi.com
The widespread use of smartphones is boosting the market take-up of dedicated
applications and among them, barcode scanning applications. Several barcodes scanners …

[HTML][HTML] CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems

ÁJ Varela-Vaca, DG Rosado, LE Sánchez… - Computers in …, 2021 - Elsevier
In the last years, cyber-physical systems (CPS) are receiving substantial mainstream
attention especially in industrial environments, but this popularity has been accompanied by …

Safety, security, and configurable software systems: a systematic mapping study

A Kenner, R May, J Krüger, G Saake… - Proceedings of the 25th …, 2021 - dl.acm.org
Safety and security are important properties of any software system, particularly in safety-
critical domains, such as embedded, automotive, or cyber-physical systems. Moreover …

A systematic mapping study of security concepts for configurable data storages

R May, C Biermann, J Krüger, G Saake… - Proceedings of the 26th …, 2022 - dl.acm.org
Most modern software systems can be configured to fulfill specific customer requirements,
adapting their behavior as required. However, such adaptations also increase the need to …

Discovering configuration workflows from existing logs using process mining

B Ramos-Gutiérrez, ÁJ Varela-Vaca, JA Galindo… - Empirical Software …, 2021 - Springer
Variability models are used to build configurators, for guiding users through the
configuration process to reach the desired setting that fulfils user requirements. The same …

Feature models to boost the vulnerability management process

ÁJ Varela-Vaca, D Borrego, MT Gómez-López… - Journal of Systems and …, 2023 - Elsevier
Vulnerability management is a critical and very challenging process that allows
organisations to design a procedure to identify potential vulnerabilities, assess the level of …

AMADEUS: towards the AutoMAteD secUrity teSting

ÁJ Varela-Vaca, RM Gasca… - Proceedings of the 24th …, 2020 - dl.acm.org
The proper configuration of systems has become a fundamental factor to avoid cybersecurity
risks. Thereby, the analysis of cybersecurity vulnerabilities is a mandatory task, but the …