Security by design for big data frameworks over cloud computing

FM Awaysheh, MN Aladwan, M Alazab… - IEEE Transactions …, 2021‏ - ieeexplore.ieee.org
Cloud deployment architectures have become a preferable computation model of Big Data
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …

Competencies for managing activities in agile projects

JR da Costa Filho, R Penha, LF da Silva… - Global Journal of …, 2022‏ - Springer
The management of activities in an agile environment takes place in iterative and
incremental processes, in which people from the development team and other project …

Automated generation of 5G fine-grained threat models: A systematic approach

D Granata, M Rak, W Mallouli - IEEE Access, 2023‏ - ieeexplore.ieee.org
Fifth-generation technology standard for broadband cellular networks, 5G, delivers a
significant increase in data speeds and capacity, as well as new capabilities such as higher …

Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)

R Kumar, R Goyal - Computers & Security, 2020‏ - Elsevier
Agile software development methodology and DevOps, together, have helped the business
to achieve agility and velocity in delivering time-to-market applications and services. Open …

[HTML][HTML] Measuring security development in information technologies: A scientometric framework using arxiv e-prints

DP David, L Maréchal, W Lacube, S Gillard… - … forecasting and social …, 2023‏ - Elsevier
We study security-development patterns in computer-science technologies through (i) the
security attention among technologies,(ii) the relation between technological change and …

A threat-based cybersecurity risk assessment approach addressing SME needs

M Van Haastrecht, I Sarhan, A Shojaifar… - Proceedings of the 16th …, 2021‏ - dl.acm.org
Cybersecurity incidents are commonplace nowadays, and Small-and Medium-Sized
Enterprises (SMEs) are exceptionally vulnerable targets. The lack of cybersecurity resources …

Enhancing Software Supply Chain Resilience: Strategy For Mitigating Software Supply Chain Security Risks And Ensuring Security Continuity In Development …

A Akinsola, A Akinde - arxiv preprint arxiv:2407.13785, 2024‏ - arxiv.org
This article delves into the strategic approaches and preventive measures necessary to
safeguard the software supply chain against evolving threats. It aims to foster an …

Novel Insights in the leadership in business and economics: A post-coronavirus update

W Strielkowski, I Firsova, S Azarova, I Shatskaya - Economies, 2022‏ - mdpi.com
Our world is evolving at an incredibly enormous speed and what was impossible three years
ago is now a reality. The concept of leadership and leaders has also undergone profound …

[HTML][HTML] Secure software development and testing: A model-based methodology

V Casola, A De Benedictis, C Mazzocca… - Computers & Security, 2024‏ - Elsevier
Modern industries widely rely upon software and IT services, in a context where cybercrime
is rapidly spreading in more and more sectors. Unfortunately, despite greater general …

Passphrase and keystroke dynamics authentication: Usable security

B Bhana, S Flowerday - Computers & Security, 2020‏ - Elsevier
It was found that employees spend a total of 2.25 days within 60 days on password-related
activities. The time consumed by this is unproductive and has a negative impact on usability …