Security patterns: A systematic map** study

AJ Jafari, A Rasoolzadegan - Journal of Computer Languages, 2020 - Elsevier
Security patterns are a well-established means to encapsulate and communicate proven
security solutions and introduce security into the development process. Our objective is to …

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

M Riaz, J King, J Slankas, L Williams… - Empirical software …, 2017 - Springer
Identifying security requirements early on can lay the foundation for secure software
development. Security requirements are often implied by existing functional requirements …

A methodology for aligning usability and security in systems and services

B Naqvi, A Seffah - 2018 3rd International Conference on …, 2018 - ieeexplore.ieee.org
Conflict between usability and security is a widely recognized research problem in industry
and academia. Failure to design systems, which are simultaneously usable and secure, may …

A template for writing security requirements

M Kamalrudin, N Mustafa, S Sidek - … Engineering for Internet of Things: 4th …, 2018 - Springer
Quality security requirements contribute to the success of secure software development.
However, the process of eliciting and writing security requirements is tedious and complex, It …

Incorporating the human facet of security in develo** systems and services

B Naqvi, N Clarke, J Porras - Information & Computer Security, 2021 - emerald.com
Purpose The purpose of this paper is to present an integrative framework for handling the
security and usability conflicts during the system development lifecycle. The framework has …

With ChatGPT, do we have to rewrite our learning objectives-CASE study in Cybersecurity

P Jamieson, S Bhunia, DM Rao - 2023 IEEE Frontiers in …, 2023 - ieeexplore.ieee.org
With the emergence of Artificial Intelligent chatbot tools such as ChatGPT and code writing
AI tools such as GitHub Copilot, educators need to question what and how we should teach …

[PDF][PDF] **当性検証を備えた脈波認証

日夏俊 - (No Title), 2023 - oshiro.bpe.es.osaka-u.ac.jp
It is important to implement countermeasures against various cyber attacks such as identity
spoofing. A typical countermeasure against the spoofing is an authentication such as …

Aligning misuse case oriented quality requirements metrics with machine learning approach

AS Poonia, C Banerjee, A Banerjee… - Soft Computing: Theories …, 2019 - Springer
In the recent years, techniques and approaches associated with machine learning are being
proposed to improvise the aspect of security of software product. These techniques and …

Interactive Minutes Generation System Based on Hierarchical Discussion Structure

H Miura, Y Takegawa, A Terai… - 2018 IEEE/WIC/ACM …, 2018 - ieeexplore.ieee.org
This research leads to the development of a system that generates minutes by using
repeated questions and answers between a user and the system. The aim of the research is …

[PDF][PDF] SecureMEReq: A Tool Support to Check for Completeness of Security Requirements

N Mustafa, M Kamalrudin, S Sidek - academia.edu
Quality security requirements help secure software development to succeed. While
considerable research can be discovered in the field of demands elicitation, less attention …