Security risks in cyber physical systems—a systematic mapping study
The increased need for constant connectivity and complete automation of existing systems
fuels the popularity of Cyber Physical Systems (CPS) worldwide. Increasingly more, these …
fuels the popularity of Cyber Physical Systems (CPS) worldwide. Increasingly more, these …
Systematic literature review of security pattern research
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …
and operations that often appear in certain contexts. Since the late 1990s, about 500 …
Annotation of software requirements specification (srs), extractions of nonfunctional requirements, and measurement of their tradeoff
Software requirement artifacts such as manuals request for proposals, and software
requirements specification (SRS) are commonly focused on functional requirements. In most …
requirements specification (SRS) are commonly focused on functional requirements. In most …
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns
Privacy patterns describe core aspects of privacy-enhancing solutions to recurring problems
and can, therefore, be instrumental to the privacy-by-design paradigm. However, the privacy …
and can, therefore, be instrumental to the privacy-by-design paradigm. However, the privacy …
Guiding the selection of security patterns for real-time systems
Securing critical systems such as Cyber-Physical Systems (CPS) is an important feature
especially when it comes to critical transmitted data in a real-time environment. At the same …
especially when it comes to critical transmitted data in a real-time environment. At the same …
Research Landscape of Patterns in Software Engineering: Taxonomy, State-of-the-Art, and Future Directions
Software system development is a difficult, error-prone, and time-consuming task. Pattern-
based development has been successfully used to produce high-quality software to address …
based development has been successfully used to produce high-quality software to address …
A template for writing security requirements
Quality security requirements contribute to the success of secure software development.
However, the process of eliciting and writing security requirements is tedious and complex, It …
However, the process of eliciting and writing security requirements is tedious and complex, It …
A reimagined catalogue of software security patterns
A van Den Berghe, K Yskout, W Joosen - Proceedings of the 3rd …, 2022 - dl.acm.org
Since their introduction, security patterns had the promise to aid non-security experts to
design secure software, yet in practice adoption and thus impact of security patterns remains …
design secure software, yet in practice adoption and thus impact of security patterns remains …
Security requirements specification by formal methods: a research metadata analysis
In recent years, the field of security requirements specification by formal methods has
changed radically. The security requirement specification is now one of the widely …
changed radically. The security requirement specification is now one of the widely …
Model-based real-time evaluation of security patterns: A SCADA system case study
Securing critical systems such as cyber physical systems (CPS) is an important feature
especially when it comes to critical transmitted data. At the same time, the implementation of …
especially when it comes to critical transmitted data. At the same time, the implementation of …