[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions
R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
[HTML][HTML] Software compliance requirements, factors, and policies: A systematic literature review
Background Recent statistics reveal that 56% of software attacks are caused by insider
negligence and 26% are caused by malicious insiders. They also show that 67% of …
negligence and 26% are caused by malicious insiders. They also show that 67% of …
Synthetic minority oversampling technique for optimizing classification tasks in botnet and intrusion-detection-system datasets
D Gonzalez-Cuautle, A Hernandez-Suarez… - Applied Sciences, 2020 - mdpi.com
Presently, security is a hot research topic due to the impact in daily information infrastructure.
Machine-learning solutions have been improving classical detection practices, but detection …
Machine-learning solutions have been improving classical detection practices, but detection …
Security and privacy of QR code applications: a comprehensive study, general guidelines and solutions
HAM Wahsheh, FL Luccio - Information, 2020 - mdpi.com
The widespread use of smartphones is boosting the market take-up of dedicated
applications and among them, barcode scanning applications. Several barcodes scanners …
applications and among them, barcode scanning applications. Several barcodes scanners …
[HTML][HTML] CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
In the last years, cyber-physical systems (CPS) are receiving substantial mainstream
attention especially in industrial environments, but this popularity has been accompanied by …
attention especially in industrial environments, but this popularity has been accompanied by …
Safety, security, and configurable software systems: a systematic mapping study
Safety and security are important properties of any software system, particularly in safety-
critical domains, such as embedded, automotive, or cyber-physical systems. Moreover …
critical domains, such as embedded, automotive, or cyber-physical systems. Moreover …
A systematic mapping study of security concepts for configurable data storages
Most modern software systems can be configured to fulfill specific customer requirements,
adapting their behavior as required. However, such adaptations also increase the need to …
adapting their behavior as required. However, such adaptations also increase the need to …
Discovering configuration workflows from existing logs using process mining
Variability models are used to build configurators, for guiding users through the
configuration process to reach the desired setting that fulfils user requirements. The same …
configuration process to reach the desired setting that fulfils user requirements. The same …
Feature models to boost the vulnerability management process
Vulnerability management is a critical and very challenging process that allows
organisations to design a procedure to identify potential vulnerabilities, assess the level of …
organisations to design a procedure to identify potential vulnerabilities, assess the level of …
AMADEUS: towards the AutoMAteD secUrity teSting
ÁJ Varela-Vaca, RM Gasca… - Proceedings of the 24th …, 2020 - dl.acm.org
The proper configuration of systems has become a fundamental factor to avoid cybersecurity
risks. Thereby, the analysis of cybersecurity vulnerabilities is a mandatory task, but the …
risks. Thereby, the analysis of cybersecurity vulnerabilities is a mandatory task, but the …