Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust

C Buck, C Olenberger, A Schweizer, F Völter… - Computers & …, 2021 - Elsevier
In response to weaknesses of current network security solutions, the zero-trust model follows
the idea that no network–whether internal or external–is trustworthy. The concept of zero …

Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

On the performance of hybrid search strategies for systematic literature reviews in software engineering

E Mourão, JF Pimentel, L Murta, M Kalinowski… - Information and software …, 2020 - Elsevier
Abstract Context When conducting a Systematic Literature Review (SLR), researchers
usually face the challenge of designing a search strategy that appropriately balances result …

Automated testing of android apps: A systematic literature review

P Kong, L Li, J Gao, K Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Automated testing of Android apps is essential for app users, app developers, and market
maintainer communities alike. Given the widespread adoption of Android and the …

Thirteen years of SysML: a systematic map** study

S Wolny, A Mazak, C Carpella, V Geist… - Software and Systems …, 2020 - Springer
Abstract The OMG standard Systems Modeling Language (SysML) has been on the market
for about thirteen years. This standard is an extended subset of UML providing a graphical …
PH Nguyen, S Ali, T Yue - Information and Software Technology, 2017 - Elsevier
Abstract Context Cyber-physical systems (CPSs) have emerged to be the next generation of
engineered systems driving the so-called fourth industrial revolution. CPSs are becoming …

A decade of research on patterns and architectures for IoT security

T Rajmohan, PH Nguyen, N Ferry - Cybersecurity, 2022 - Springer
Security of the Internet of Things (IoT)-based Smart Systems involving sensors, actuators
and distributed control loop is of paramount importance but very difficult to address. Security …

Security assurance model of software development for global software development vendors

RA Khan, SU Khan, M Alzahrani, M Ilyas - Ieee Access, 2022 - ieeexplore.ieee.org
The number of security attacks and the impact has grown considerably in the recent several
years. As a result, new emerging software development models are required that assist in …

A systematic literature review of model-driven security engineering for cyber–physical systems

J Geismann, E Bodden - Journal of Systems and Software, 2020 - Elsevier
The last years have elevated the importance of cyber–physical systems like IoT applications,
smart cars, or industrial control systems, and, therefore, these systems have also come into …

[HTML][HTML] A model-based mode-switching framework based on security vulnerability scores

M Riegler, J Sametinger, M Vierhauser… - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities can affect critical systems within an organization impacting
processes, workflows, privacy, and safety. When a software vulnerability becomes known …