A systematic mapping study of security concepts for configurable data storages

R May, C Biermann, J Krüger, G Saake… - Proceedings of the 26th …, 2022 - dl.acm.org
Most modern software systems can be configured to fulfill specific customer requirements,
adapting their behavior as required. However, such adaptations also increase the need to …

Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope

ZA Sheikh, Y Singh, PK Singh, KZ Ghafoor - Computer Communications, 2022 - Elsevier
Abstract Cyber–Physical Systems (CPS) are developed by the integration of computational
algorithms and physical components and they exist as a result of technological …

[PDF][PDF] Product-line engineering for smart manufacturing: A systematic mapping study on security concepts

R May, AJ Alex, R Suresh, T Leich - International Conference on …, 2024 - researchgate.net
The growing configurability of smart-manufacturing software systems (SMSS) introduces a
variety of security concerns. Although there is an ever-increasing risk for exploiting …

[HTML][HTML] Onto-CARMEN: ontology-driven approach for cyber–physical system security requirements meta-modelling and reasoning

C Blanco, DG Rosado, ÁJ Varela-Vaca… - Internet of Things, 2023 - Elsevier
In the last years, Cyber–physical systems (CPS) have attracted substantial mainstream,
especially in the industrial sector, since they have become the focus of cyber-attacks. CPS …

Vulnerably (mis) configured? Exploring 10 years of developers' Q&As on Stack Overflow

R May, C Biermann, XM Zerweck, K Ludwig… - Proceedings of the 18th …, 2024 - dl.acm.org
The increasing number of attacks exploiting system vulnerabilities in recent years underpins
the growing importance of security; especially for software comprising configuration options …

Improving the safety and security of software systems by mediating SAP verification

MF Almufareh, M Humayun - Applied Sciences, 2023 - mdpi.com
Security and performance (SAP) are two critical NFRs that affect the successful completion
of software projects. Organizations need to follow the practices that are vital to SAP …

[HTML][HTML] Automated trusted collaborative processes through blockchain & IoT integration: The fraud detection case

ÁJ Varela-Vaca, RM Gasca, D Iglesias… - Internet of Things, 2024 - Elsevier
Collaboration of business processes is essential for business-to-business (B2B) processes.
Collaboration is interesting and important in connecting the digital context with the physical …

[HTML][HTML] Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems

J Zhang, Y Yuan, J Zhang, Y Yang, W Xie - Journal of King Saud University …, 2023 - Elsevier
Real-time system status detection must be accurate and reliable due to the close coupling of
Cyber–Physical Systems (CPS) components. In order to improve the effectiveness of the …

[HTML][HTML] MBIPV: a model-based approach for identifying privacy violations from software requirements

T Ye, Y Zhuang, G Qiao - Software and Systems Modeling, 2023 - Springer
Nowadays, large-scale software systems in many domains, such as smart cities, involve
multiple parties whose privacy policies may conflict with each other, and thus, data privacy …

Position Paper: Leveraging Large Language Models for Cybersecurity Compliance

A Salman, S Creese… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
This position paper proposes the use of Large Language Models (LLMs) to evaluate the
compliance of cybersecurity controls with organisational policies. We high-light the …