Internet of Things (IoT) cybersecurity research: A review of current research topics

Y Lu, L Da Xu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As an emerging technology, the Internet of Things (IoT) revolutionized the global network
comprising of people, smart devices, intelligent objects, data, and information. The …

Internet of things: Vision, applications and research challenges

D Miorandi, S Sicari, F De Pellegrini, I Chlamtac - Ad hoc networks, 2012 - Elsevier
The term “Internet-of-Things” is used as an umbrella keyword for covering various aspects
related to the extension of the Internet and the Web into the physical realm, by means of the …

The wave kernel signature: A quantum mechanical approach to shape analysis

M Aubry, U Schlickewei… - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
We introduce the Wave Kernel Signature (WKS) for characterizing points on non-rigid three-
dimensional shapes. The WKS represents the average probability of measuring a quantum …

A reference model of information assurance & security

Y Cherdantseva, J Hilton - 2013 international conference on …, 2013 - ieeexplore.ieee.org
Information Assurance & Security (IAS) is a dynamic domain which changes continuously in
response to the evolution of society, business needs and technology. This paper proposes a …

[LIVRE][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

Security requirements engineering: A framework for representation and analysis

C Haley, R Laney, J Moffett… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper presents a framework for security requirements elicitation and analysis. The
framework is based on constructing a context for the system, representing security …

Secure tropos: a security-oriented extension of the tropos methodology

H Mouratidis, P Giorgini - International Journal of Software …, 2007 - World Scientific
Although security plays an important role in the development of multiagent systems, a
careful analysis of software development processes shows that the definition of security …

Cloud security engineering: Early stages of SDLC

SA Aljawarneh, A Alawneh, R Jaradat - Future Generation Computer …, 2017 - Elsevier
Security vulnerabilities and defects are results of poorly constructed software that can lead to
easy exploitation by the cyber criminals. A large number of Cloud software systems are …

Addressing privacy requirements in system design: the PriS method

C Kalloniatis, E Kavakli, S Gritzalis - Requirements Engineering, 2008 - Springer
A major challenge in the field of software engineering is to make users trust the software that
they use in their every day activities for professional or recreational reasons. Trusting …

A BPMN extension for the modeling of security requirements in business processes

A Rodríguez, E Fernández-Medina… - IEICE transactions on …, 2007 - search.ieice.org
Business Processes are considered a crucial issue by many enterprises because they are
the key to maintain competitiveness. Moreover, business processes are important for …