Review of cybersecurity assessment methods: Applicability perspective
R Leszczyna - Computers & Security, 2021 - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …
effectively protected from threats. Multiple assessment methods have been proposed during …
Software-testing education: A systematic literature map**
Context With the rising complexity and scale of software systems, there is an ever-increasing
demand for sophisticated and cost-effective software testing. To meet such a demand, there …
demand for sophisticated and cost-effective software testing. To meet such a demand, there …
Smells in software test code: A survey of knowledge in industry and academia
V Garousi, B Küçük - Journal of systems and software, 2018 - Elsevier
As a type of anti-pattern, test smells are defined as poorly designed tests and their presence
may negatively affect the quality of test suites and production code. Test smells are the …
may negatively affect the quality of test suites and production code. Test smells are the …
Aligning software engineering education with industrial needs: A meta-analysis
Context According to various reports, many software engineering (SE) graduates often face
difficulties when beginning their careers, which is mainly due to misalignment of the skills …
difficulties when beginning their careers, which is mainly due to misalignment of the skills …
Software test maturity assessment and test process improvement: A multivocal literature review
Context Software testing practices and processes in many companies are far from being
mature and are usually conducted in ad-hoc fashions. Such immature practices lead to …
mature and are usually conducted in ad-hoc fashions. Such immature practices lead to …
Testing embedded software: A survey of the literature
V Garousi, M Felderer, ÇM Karapıçak… - Information and Software …, 2018 - Elsevier
Context Embedded systems have overwhelming penetration around the world. Innovations
are increasingly triggered by software embedded in automotive, transportation, medical …
are increasingly triggered by software embedded in automotive, transportation, medical …
[HTML][HTML] A taxonomy of attack mechanisms in the automotive domain
I Pekaric, C Sauerwein, S Haselwanter… - Computer Standards & …, 2021 - Elsevier
In the last decade, the automotive industry incorporated multiple electronic components into
vehicles introducing various capabilities for adversaries to generate diverse types of attacks …
vehicles introducing various capabilities for adversaries to generate diverse types of attacks …
An analysis and classification of public information security data sources used in research and practice
In order to counteract today's sophisticated and increasing number of cyber threats the
timely acquisition of information regarding vulnerabilities, attacks, threats, countermeasures …
timely acquisition of information regarding vulnerabilities, attacks, threats, countermeasures …
Security testing of internet of things for smart city applications: A formal approach
This is a work in progress in which we are interested in testing security aspects of Internet of
Things for smart cities. For this purpose we follow a model-based approach which consists …
Things for smart cities. For this purpose we follow a model-based approach which consists …
A hybrid MCDM model combining DANP and PROMETHEE II methods for the assessment of cybersecurity in industry 4.0
W Torbacki - Sustainability, 2021 - mdpi.com
IT technologies related to Industry 4.0 facilitate the implementation of the framework for
sustainable manufacturing. At the same time, Industry 4.0 integrates IT processes and …
sustainable manufacturing. At the same time, Industry 4.0 integrates IT processes and …