A review of various security and privacy innovations for IoT applications in healthcare

A Raghuvanshi, UK Singh… - … physicians with IoT …, 2022 - Wiley Online Library
Summary The Internet of Things (IoT) provides a wide variety of healthcare uses, including
assistance for independent living and well‐being and illness control. Furthermore, IoT …

A preliminary structure of software security assurance model

RA Khan, SU Khan - Proceedings of the 13th International Conference …, 2018 - dl.acm.org
Software security is an important aspect that needs to be considered during the entire
software development life cycle (SDLC). Integrating software security at each phase of …

Cybersecurity model based on hardening for secure internet of things implementation

A Echeverría, C Cevallos, I Ortiz-Garces, RO Andrade - Applied Sciences, 2021 - mdpi.com
The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids,
and other smart concepts has driven data-driven decision making by managers and …

IoTSM: an end-to-end security model for IoT ecosystems

J Bugeja, B Vogel, A Jacobsson… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) market is growing rapidly, allowing continuous evolution of new
technologies. Alongside this development, most IoT devices are easy to compromise, as …

[PDF][PDF] An investigation on detection of vulnerabilities in Internet of Things

A Raghuvanshi, UK Singh, C Bulla… - European Journal of …, 2020 - academia.edu
IoT is a woven mixture of traditional systems, sensors, clouds, mobile applications, Web
applications and control systems, affecting every aspect of people's lives. Security concerns …

[PDF][PDF] Black box evaluation of web application scanners: Standards map** approach

M Qasaimeh, A Shamlawi… - Journal of Theoretical and …, 2018 - researchgate.net
ABSTRACT The Secure Development Life Cycle (SDLC) of web applications aims to
enhance the quality attributes of released applications. Security is among of the important …

[HTML][HTML] Evaluating software security maturity using OWASP SAMM: Different approaches and stakeholders perceptions

D Fucci, E Alégroth, M Felderer… - Journal of Systems and …, 2024 - Elsevier
Background: Recent years have seen a surge in cyber-attacks, which can be prevented or
mitigated using software security activities. OWASP SAMM is a maturity model providing a …

An integrated security testing framework for secure software development life cycle

YH Tung, SC Lo, JF Shih, HF Lin - 2016 18th Asia-Pacific …, 2016 - ieeexplore.ieee.org
Hundreds of vulnerabilities and security defects are disclosed by hackers, developers, and
users. The better way to improve software security is to enhance security process into SDLC …

[PDF][PDF] A review on factors influencing implementation of secure software development practices

SL Kanniah, MN Mahrin - International Journal of Computer and …, 2016 - academia.edu
More and more businesses and services are depending on software to run their daily
operations and business services. At the same time, cyber-attacNs are becoming more …

Root cause analysis of session management and broken authentication vulnerabilities

D Huluka, O Popov - World Congress on Internet Security …, 2012 - ieeexplore.ieee.org
While there are numerous approaches to secure web applications as one of the most
prevalent ways to harness the potential of the Internet, attackers almost daily come up with …