Internet of Things (IoT) cybersecurity research: A review of current research topics
Y Lu, L Da Xu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As an emerging technology, the Internet of Things (IoT) revolutionized the global network
comprising of people, smart devices, intelligent objects, data, and information. The …
comprising of people, smart devices, intelligent objects, data, and information. The …
Internet of things: Vision, applications and research challenges
The term “Internet-of-Things” is used as an umbrella keyword for covering various aspects
related to the extension of the Internet and the Web into the physical realm, by means of the …
related to the extension of the Internet and the Web into the physical realm, by means of the …
The wave kernel signature: A quantum mechanical approach to shape analysis
We introduce the Wave Kernel Signature (WKS) for characterizing points on non-rigid three-
dimensional shapes. The WKS represents the average probability of measuring a quantum …
dimensional shapes. The WKS represents the average probability of measuring a quantum …
A reference model of information assurance & security
Information Assurance & Security (IAS) is a dynamic domain which changes continuously in
response to the evolution of society, business needs and technology. This paper proposes a …
response to the evolution of society, business needs and technology. This paper proposes a …
[LIVRE][B] Secure systems development with UML
J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …
High-quality development of security-critical systems is difficult, mainly because of the …
Security requirements engineering: A framework for representation and analysis
C Haley, R Laney, J Moffett… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper presents a framework for security requirements elicitation and analysis. The
framework is based on constructing a context for the system, representing security …
framework is based on constructing a context for the system, representing security …
Secure tropos: a security-oriented extension of the tropos methodology
Although security plays an important role in the development of multiagent systems, a
careful analysis of software development processes shows that the definition of security …
careful analysis of software development processes shows that the definition of security …
Cloud security engineering: Early stages of SDLC
SA Aljawarneh, A Alawneh, R Jaradat - Future Generation Computer …, 2017 - Elsevier
Security vulnerabilities and defects are results of poorly constructed software that can lead to
easy exploitation by the cyber criminals. A large number of Cloud software systems are …
easy exploitation by the cyber criminals. A large number of Cloud software systems are …
Addressing privacy requirements in system design: the PriS method
A major challenge in the field of software engineering is to make users trust the software that
they use in their every day activities for professional or recreational reasons. Trusting …
they use in their every day activities for professional or recreational reasons. Trusting …
A BPMN extension for the modeling of security requirements in business processes
Business Processes are considered a crucial issue by many enterprises because they are
the key to maintain competitiveness. Moreover, business processes are important for …
the key to maintain competitiveness. Moreover, business processes are important for …