Review of cybersecurity assessment methods: Applicability perspective

R Leszczyna - Computers & Security, 2021 - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …

Software-testing education: A systematic literature map**

V Garousi, A Rainer, P Lauvås Jr, A Arcuri - Journal of Systems and …, 2020 - Elsevier
Context With the rising complexity and scale of software systems, there is an ever-increasing
demand for sophisticated and cost-effective software testing. To meet such a demand, there …

Smells in software test code: A survey of knowledge in industry and academia

V Garousi, B Küçük - Journal of systems and software, 2018 - Elsevier
As a type of anti-pattern, test smells are defined as poorly designed tests and their presence
may negatively affect the quality of test suites and production code. Test smells are the …

Aligning software engineering education with industrial needs: A meta-analysis

V Garousi, G Giray, E Tüzün, C Catal… - Journal of Systems and …, 2019 - Elsevier
Context According to various reports, many software engineering (SE) graduates often face
difficulties when beginning their careers, which is mainly due to misalignment of the skills …

Software test maturity assessment and test process improvement: A multivocal literature review

V Garousi, M Felderer, T Hacaloğlu - Information and Software Technology, 2017 - Elsevier
Context Software testing practices and processes in many companies are far from being
mature and are usually conducted in ad-hoc fashions. Such immature practices lead to …

Testing embedded software: A survey of the literature

V Garousi, M Felderer, ÇM Karapıçak… - Information and Software …, 2018 - Elsevier
Context Embedded systems have overwhelming penetration around the world. Innovations
are increasingly triggered by software embedded in automotive, transportation, medical …

[HTML][HTML] A taxonomy of attack mechanisms in the automotive domain

I Pekaric, C Sauerwein, S Haselwanter… - Computer Standards & …, 2021 - Elsevier
In the last decade, the automotive industry incorporated multiple electronic components into
vehicles introducing various capabilities for adversaries to generate diverse types of attacks …

An analysis and classification of public information security data sources used in research and practice

C Sauerwein, I Pekaric, M Felderer, R Breu - Computers & security, 2019 - Elsevier
In order to counteract today's sophisticated and increasing number of cyber threats the
timely acquisition of information regarding vulnerabilities, attacks, threats, countermeasures …

Security testing of internet of things for smart city applications: A formal approach

M Krichen, M Lahami, O Cheikhrouhou… - Smart Infrastructure and …, 2020 - Springer
This is a work in progress in which we are interested in testing security aspects of Internet of
Things for smart cities. For this purpose we follow a model-based approach which consists …

A hybrid MCDM model combining DANP and PROMETHEE II methods for the assessment of cybersecurity in industry 4.0

W Torbacki - Sustainability, 2021 - mdpi.com
IT technologies related to Industry 4.0 facilitate the implementation of the framework for
sustainable manufacturing. At the same time, Industry 4.0 integrates IT processes and …