A review of various security and privacy innovations for IoT applications in healthcare
A Raghuvanshi, UK Singh… - … physicians with IoT …, 2022 - Wiley Online Library
Summary The Internet of Things (IoT) provides a wide variety of healthcare uses, including
assistance for independent living and well‐being and illness control. Furthermore, IoT …
assistance for independent living and well‐being and illness control. Furthermore, IoT …
A preliminary structure of software security assurance model
RA Khan, SU Khan - Proceedings of the 13th International Conference …, 2018 - dl.acm.org
Software security is an important aspect that needs to be considered during the entire
software development life cycle (SDLC). Integrating software security at each phase of …
software development life cycle (SDLC). Integrating software security at each phase of …
Cybersecurity model based on hardening for secure internet of things implementation
The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids,
and other smart concepts has driven data-driven decision making by managers and …
and other smart concepts has driven data-driven decision making by managers and …
IoTSM: an end-to-end security model for IoT ecosystems
The Internet of Things (IoT) market is growing rapidly, allowing continuous evolution of new
technologies. Alongside this development, most IoT devices are easy to compromise, as …
technologies. Alongside this development, most IoT devices are easy to compromise, as …
[PDF][PDF] An investigation on detection of vulnerabilities in Internet of Things
A Raghuvanshi, UK Singh, C Bulla… - European Journal of …, 2020 - academia.edu
IoT is a woven mixture of traditional systems, sensors, clouds, mobile applications, Web
applications and control systems, affecting every aspect of people's lives. Security concerns …
applications and control systems, affecting every aspect of people's lives. Security concerns …
[PDF][PDF] Black box evaluation of web application scanners: Standards map** approach
M Qasaimeh, A Shamlawi… - Journal of Theoretical and …, 2018 - researchgate.net
ABSTRACT The Secure Development Life Cycle (SDLC) of web applications aims to
enhance the quality attributes of released applications. Security is among of the important …
enhance the quality attributes of released applications. Security is among of the important …
[HTML][HTML] Evaluating software security maturity using OWASP SAMM: Different approaches and stakeholders perceptions
Background: Recent years have seen a surge in cyber-attacks, which can be prevented or
mitigated using software security activities. OWASP SAMM is a maturity model providing a …
mitigated using software security activities. OWASP SAMM is a maturity model providing a …
An integrated security testing framework for secure software development life cycle
YH Tung, SC Lo, JF Shih, HF Lin - 2016 18th Asia-Pacific …, 2016 - ieeexplore.ieee.org
Hundreds of vulnerabilities and security defects are disclosed by hackers, developers, and
users. The better way to improve software security is to enhance security process into SDLC …
users. The better way to improve software security is to enhance security process into SDLC …
[PDF][PDF] A review on factors influencing implementation of secure software development practices
SL Kanniah, MN Mahrin - International Journal of Computer and …, 2016 - academia.edu
More and more businesses and services are depending on software to run their daily
operations and business services. At the same time, cyber-attacNs are becoming more …
operations and business services. At the same time, cyber-attacNs are becoming more …
Root cause analysis of session management and broken authentication vulnerabilities
D Huluka, O Popov - World Congress on Internet Security …, 2012 - ieeexplore.ieee.org
While there are numerous approaches to secure web applications as one of the most
prevalent ways to harness the potential of the Internet, attackers almost daily come up with …
prevalent ways to harness the potential of the Internet, attackers almost daily come up with …