On the security of the automatic dependent surveillance-broadcast protocol

M Strohmeier, V Lenders… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol
currently being rolled out as part of next-generation air transportation systems. As the heart …

Can serious gaming tactics bolster spear-phishing and phishing resilience?: Securing the human hacking in Information Security

A Yasin, R Fatima, Z JiangBin, W Afzal… - Information and Software …, 2024 - Elsevier
Context: In the digital age, there is a notable increase in fraudulent activities perpetrated by
social engineers who exploit individuals' limited knowledge of digital devices. These actors …

[HTML][HTML] A survey of emerging threats in cybersecurity

J Jang-Jaccard, S Nepal - Journal of computer and system sciences, 2014 - Elsevier
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …

A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development

MTJ Ansari, FA Al-Zahrani, D Pandey… - BMC Medical Informatics …, 2020 - Springer
Background Today's healthcare organizations want to implement secure and quality
healthcare software as cyber-security is a significant risk factor for healthcare data …

Threat analysis of software systems: A systematic literature review

K Tuma, G Calikli, R Scandariato - Journal of Systems and Software, 2018 - Elsevier
Architectural threat analysis has become an important cornerstone for organizations
concerned with develo** secure software. Due to the large number of existing techniques …

Aviation cyber–physical systems: Foundations for future aircraft and air transport

K Sampigethaya, R Poovendran - Proceedings of the IEEE, 2013 - ieeexplore.ieee.org
A century of revolutionary growth in aviation has made global travel a reality of daily life.
Aircraft and air transport overcame a number of formidable challenges and hostilities in the …

Systematic map** study on security approaches in secure software engineering

RA Khan, SU Khan, HU Khan, M Ilyas - Ieee Access, 2021 - ieeexplore.ieee.org
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …

[HTML][HTML] STORE: Security threat oriented requirements engineering methodology

MTJ Ansari, D Pandey, M Alenezi - … of King Saud University-Computer and …, 2022 - Elsevier
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …

A descriptive study of Microsoft's threat modeling technique

R Scandariato, K Wuyts, W Joosen - Requirements Engineering, 2015 - Springer
Microsoft's STRIDE is a popular threat modeling technique commonly used to discover the
security weaknesses of a software system. In turn, discovered weaknesses are a major …

A comparison of security requirements engineering methods

B Fabian, S Gürses, M Heisel, T Santen… - Requirements …, 2010 - Springer
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …