Security risks in cyber physical systems—a systematic mapping study

M Zahid, I Inayat, M Daneva… - Journal of Software …, 2021 - Wiley Online Library
The increased need for constant connectivity and complete automation of existing systems
fuels the popularity of Cyber Physical Systems (CPS) worldwide. Increasingly more, these …

Systematic literature review of security pattern research

H Washizaki, T Xia, N Kamata, Y Fukazawa, H Kanuka… - Information, 2021 - mdpi.com
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …

Annotation of software requirements specification (srs), extractions of nonfunctional requirements, and measurement of their tradeoff

M Asif, I Ali, MSA Malik, MH Chaudary, S Tayyaba… - IEEE …, 2019 - ieeexplore.ieee.org
Software requirement artifacts such as manuals request for proposals, and software
requirements specification (SRS) are commonly focused on functional requirements. In most …

Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns

A Al-Momani, K Wuyts, L Sion, F Kargl… - Proceedings of the 36th …, 2021 - dl.acm.org
Privacy patterns describe core aspects of privacy-enhancing solutions to recurring problems
and can, therefore, be instrumental to the privacy-by-design paradigm. However, the privacy …

Guiding the selection of security patterns for real-time systems

A Motii, B Hamid, A Lanusse… - 2016 21st International …, 2016 - ieeexplore.ieee.org
Securing critical systems such as Cyber-Physical Systems (CPS) is an important feature
especially when it comes to critical transmitted data in a real-time environment. At the same …

Research Landscape of Patterns in Software Engineering: Taxonomy, State-of-the-Art, and Future Directions

R Mzid, S Selvi, M Abid - SN Computer Science, 2024 - Springer
Software system development is a difficult, error-prone, and time-consuming task. Pattern-
based development has been successfully used to produce high-quality software to address …

A template for writing security requirements

M Kamalrudin, N Mustafa, S Sidek - … Engineering for Internet of Things: 4th …, 2018 - Springer
Quality security requirements contribute to the success of secure software development.
However, the process of eliciting and writing security requirements is tedious and complex, It …

A reimagined catalogue of software security patterns

A van Den Berghe, K Yskout, W Joosen - Proceedings of the 3rd …, 2022 - dl.acm.org
Since their introduction, security patterns had the promise to aid non-security experts to
design secure software, yet in practice adoption and thus impact of security patterns remains …

Security requirements specification by formal methods: a research metadata analysis

AD Mishra, K Mustafa - Multimedia Tools and Applications, 2024 - Springer
In recent years, the field of security requirements specification by formal methods has
changed radically. The security requirement specification is now one of the widely …

Model-based real-time evaluation of security patterns: A SCADA system case study

A Motii, A Lanusse, B Hamid, JM Bruel - Computer Safety, Reliability, and …, 2016 - Springer
Securing critical systems such as cyber physical systems (CPS) is an important feature
especially when it comes to critical transmitted data. At the same time, the implementation of …