Cyber security challenges and its emerging trends on latest technologies

KM Rajasekharaiah, CS Dule… - IOP Conference Series …, 2020 - iopscience.iop.org
Today, due to the modern life style people have joined technology life and using more
technology for shopping as well as financial transactions in their cyber space. At the same …

A systematic literature review of istar extensions

E Gonçalves, J Castro, J Araújo, T Heineck - Journal of Systems and …, 2018 - Elsevier
Abstract iStar is a general-purpose goal-based modelling language used to model
requirements at early and late phases of software development. It has been used in …

An effective security requirements engineering framework for cyber-physical systems

SU Rehman, V Gruhn - Technologies, 2018 - mdpi.com
Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other
systems. The heterogeneity of these systems increases the importance of security. Both the …

A readiness model for security requirements engineering

Y Mufti, M Niazi, M Alshayeb, S Mahmood - IEEE Access, 2018 - ieeexplore.ieee.org
The focus on secure software development has been growing steadily in all phases of the
software development life cycle. Security awareness in the requirements engineering stage …

A maturity model for secure requirements engineering

M Niazi, AM Saeed, M Alshayeb, S Mahmood… - Computers & …, 2020 - Elsevier
Security is considered to be a critical software quality attribute. Tackling security at the
requirements phase helps to avoid the need to rework secure software development issues …

[HTML][HTML] CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems

ÁJ Varela-Vaca, DG Rosado, LE Sánchez… - Computers in …, 2021 - Elsevier
In the last years, cyber-physical systems (CPS) are receiving substantial mainstream
attention especially in industrial environments, but this popularity has been accompanied by …

Safety, security, and configurable software systems: a systematic mapping study

A Kenner, R May, J Krüger, G Saake… - Proceedings of the 25th …, 2021 - dl.acm.org
Safety and security are important properties of any software system, particularly in safety-
critical domains, such as embedded, automotive, or cyber-physical systems. Moreover …

ASE: A comprehensive pattern-driven security methodology for distributed systems

AV Uzunov, EB Fernandez, K Falkner - Computer Standards & Interfaces, 2015 - Elsevier
Incorporating security features is one of the most important and challenging tasks in
designing distributed systems. Over the last decade, researchers and practitioners have …

A product-line-engineering framework for secure enterprise-resource-planning systems

R May, C Biermann, A Kenner, J Krüger… - Procedia Computer …, 2024 - Elsevier
Abstract Enterprise-resource-planning (ERP) systems are highly complex, incorporating
critical data and configuration options that can easily cause security threats or risks. While …

Understanding what is important in iStar extension proposals: the viewpoint of researchers

E Gonçalves, MA de Oliveira, I Monteiro… - Requirements …, 2019 - Springer
Abstract iStar is a goal-based requirements modelling language, being used in both
industrial and academic projects of different domains. Often the language is extended to …