A systematic mapping study of security concepts for configurable data storages
Most modern software systems can be configured to fulfill specific customer requirements,
adapting their behavior as required. However, such adaptations also increase the need to …
adapting their behavior as required. However, such adaptations also increase the need to …
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope
Abstract Cyber–Physical Systems (CPS) are developed by the integration of computational
algorithms and physical components and they exist as a result of technological …
algorithms and physical components and they exist as a result of technological …
[PDF][PDF] Product-line engineering for smart manufacturing: A systematic mapping study on security concepts
The growing configurability of smart-manufacturing software systems (SMSS) introduces a
variety of security concerns. Although there is an ever-increasing risk for exploiting …
variety of security concerns. Although there is an ever-increasing risk for exploiting …
[HTML][HTML] Onto-CARMEN: ontology-driven approach for cyber–physical system security requirements meta-modelling and reasoning
C Blanco, DG Rosado, ÁJ Varela-Vaca… - Internet of Things, 2023 - Elsevier
In the last years, Cyber–physical systems (CPS) have attracted substantial mainstream,
especially in the industrial sector, since they have become the focus of cyber-attacks. CPS …
especially in the industrial sector, since they have become the focus of cyber-attacks. CPS …
Vulnerably (mis) configured? Exploring 10 years of developers' Q&As on Stack Overflow
The increasing number of attacks exploiting system vulnerabilities in recent years underpins
the growing importance of security; especially for software comprising configuration options …
the growing importance of security; especially for software comprising configuration options …
Improving the safety and security of software systems by mediating SAP verification
MF Almufareh, M Humayun - Applied Sciences, 2023 - mdpi.com
Security and performance (SAP) are two critical NFRs that affect the successful completion
of software projects. Organizations need to follow the practices that are vital to SAP …
of software projects. Organizations need to follow the practices that are vital to SAP …
[HTML][HTML] Automated trusted collaborative processes through blockchain & IoT integration: The fraud detection case
ÁJ Varela-Vaca, RM Gasca, D Iglesias… - Internet of Things, 2024 - Elsevier
Collaboration of business processes is essential for business-to-business (B2B) processes.
Collaboration is interesting and important in connecting the digital context with the physical …
Collaboration is interesting and important in connecting the digital context with the physical …
[HTML][HTML] Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems
J Zhang, Y Yuan, J Zhang, Y Yang, W Xie - Journal of King Saud University …, 2023 - Elsevier
Real-time system status detection must be accurate and reliable due to the close coupling of
Cyber–Physical Systems (CPS) components. In order to improve the effectiveness of the …
Cyber–Physical Systems (CPS) components. In order to improve the effectiveness of the …
[HTML][HTML] MBIPV: a model-based approach for identifying privacy violations from software requirements
T Ye, Y Zhuang, G Qiao - Software and Systems Modeling, 2023 - Springer
Nowadays, large-scale software systems in many domains, such as smart cities, involve
multiple parties whose privacy policies may conflict with each other, and thus, data privacy …
multiple parties whose privacy policies may conflict with each other, and thus, data privacy …
Position Paper: Leveraging Large Language Models for Cybersecurity Compliance
A Salman, S Creese… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
This position paper proposes the use of Large Language Models (LLMs) to evaluate the
compliance of cybersecurity controls with organisational policies. We high-light the …
compliance of cybersecurity controls with organisational policies. We high-light the …