Cyber security challenges and its emerging trends on latest technologies
KM Rajasekharaiah, CS Dule… - IOP Conference Series …, 2020 - iopscience.iop.org
Today, due to the modern life style people have joined technology life and using more
technology for shopping as well as financial transactions in their cyber space. At the same …
technology for shopping as well as financial transactions in their cyber space. At the same …
A systematic literature review of istar extensions
Abstract iStar is a general-purpose goal-based modelling language used to model
requirements at early and late phases of software development. It has been used in …
requirements at early and late phases of software development. It has been used in …
An effective security requirements engineering framework for cyber-physical systems
Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other
systems. The heterogeneity of these systems increases the importance of security. Both the …
systems. The heterogeneity of these systems increases the importance of security. Both the …
A readiness model for security requirements engineering
The focus on secure software development has been growing steadily in all phases of the
software development life cycle. Security awareness in the requirements engineering stage …
software development life cycle. Security awareness in the requirements engineering stage …
A maturity model for secure requirements engineering
Security is considered to be a critical software quality attribute. Tackling security at the
requirements phase helps to avoid the need to rework secure software development issues …
requirements phase helps to avoid the need to rework secure software development issues …
[HTML][HTML] CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
In the last years, cyber-physical systems (CPS) are receiving substantial mainstream
attention especially in industrial environments, but this popularity has been accompanied by …
attention especially in industrial environments, but this popularity has been accompanied by …
Safety, security, and configurable software systems: a systematic mapping study
Safety and security are important properties of any software system, particularly in safety-
critical domains, such as embedded, automotive, or cyber-physical systems. Moreover …
critical domains, such as embedded, automotive, or cyber-physical systems. Moreover …
ASE: A comprehensive pattern-driven security methodology for distributed systems
AV Uzunov, EB Fernandez, K Falkner - Computer Standards & Interfaces, 2015 - Elsevier
Incorporating security features is one of the most important and challenging tasks in
designing distributed systems. Over the last decade, researchers and practitioners have …
designing distributed systems. Over the last decade, researchers and practitioners have …
A product-line-engineering framework for secure enterprise-resource-planning systems
Abstract Enterprise-resource-planning (ERP) systems are highly complex, incorporating
critical data and configuration options that can easily cause security threats or risks. While …
critical data and configuration options that can easily cause security threats or risks. While …
Understanding what is important in iStar extension proposals: the viewpoint of researchers
Abstract iStar is a goal-based requirements modelling language, being used in both
industrial and academic projects of different domains. Often the language is extended to …
industrial and academic projects of different domains. Often the language is extended to …