Security patterns: A systematic map** study

AJ Jafari, A Rasoolzadegan - Journal of Computer Languages, 2020 - Elsevier
Security patterns are a well-established means to encapsulate and communicate proven
security solutions and introduce security into the development process. Our objective is to …

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

M Riaz, J King, J Slankas, L Williams… - Empirical software …, 2017 - Springer
Identifying security requirements early on can lay the foundation for secure software
development. Security requirements are often implied by existing functional requirements …

A methodology for aligning usability and security in systems and services

B Naqvi, A Seffah - 2018 3rd International Conference on …, 2018 - ieeexplore.ieee.org
Conflict between usability and security is a widely recognized research problem in industry
and academia. Failure to design systems, which are simultaneously usable and secure, may …

A template for writing security requirements

M Kamalrudin, N Mustafa, S Sidek - … Engineering for Internet of Things: 4th …, 2018 - Springer
Quality security requirements contribute to the success of secure software development.
However, the process of eliciting and writing security requirements is tedious and complex, It …

With ChatGPT, do we have to rewrite our learning objectives-CASE study in Cybersecurity

P Jamieson, S Bhunia, DM Rao - 2023 IEEE Frontiers in …, 2023 - ieeexplore.ieee.org
With the emergence of Artificial Intelligent chatbot tools such as ChatGPT and code writing
AI tools such as GitHub Copilot, educators need to question what and how we should teach …

Incorporating the human facet of security in develo** systems and services

B Naqvi, N Clarke, J Porras - Information & Computer Security, 2021 - emerald.com
Purpose The purpose of this paper is to present an integrative framework for handling the
security and usability conflicts during the system development lifecycle. The framework has …

[PDF][PDF] Padrões de Requisitos para Sistemas de Registro Eletrônico de Saúde.

MC Martins, TN Kudo, RB Neto - WER, 2021 - inf.puc-rio.br
Um catálogo de padroes de requisitos de software (CPRS) organiza requisitos comuns
entre aplicaçoes de um domınio para que sejam reusados e, assim, reduzir os esforços de …

Interactive minutes generation system based on hierarchical discussion structure

H Miura, Y Takegawa, A Terai, K Hirata - Web Intelligence, 2020 - journals.sagepub.com
This research leads to the development of a system that generates minutes while the system
and user interactively structure and summarize the discussion. The system can look back on …

[PDF][PDF] **当性検証を備えた脈波認証

日夏俊 - (No Title), 2023 - ir.library.osaka-u.ac.jp
It is important to implement countermeasures against various cyber attacks such as identity
spoofing. A typical countermeasure against the spoofing is an authentication such as …

Aligning misuse case oriented quality requirements metrics with machine learning approach

AS Poonia, C Banerjee, A Banerjee… - Soft Computing: Theories …, 2019 - Springer
In the recent years, techniques and approaches associated with machine learning are being
proposed to improvise the aspect of security of software product. These techniques and …