Security by design for big data frameworks over cloud computing
Cloud deployment architectures have become a preferable computation model of Big Data
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …
Competencies for managing activities in agile projects
The management of activities in an agile environment takes place in iterative and
incremental processes, in which people from the development team and other project …
incremental processes, in which people from the development team and other project …
Automated generation of 5G fine-grained threat models: A systematic approach
Fifth-generation technology standard for broadband cellular networks, 5G, delivers a
significant increase in data speeds and capacity, as well as new capabilities such as higher …
significant increase in data speeds and capacity, as well as new capabilities such as higher …
Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)
Agile software development methodology and DevOps, together, have helped the business
to achieve agility and velocity in delivering time-to-market applications and services. Open …
to achieve agility and velocity in delivering time-to-market applications and services. Open …
[HTML][HTML] Measuring security development in information technologies: A scientometric framework using arxiv e-prints
We study security-development patterns in computer-science technologies through (i) the
security attention among technologies,(ii) the relation between technological change and …
security attention among technologies,(ii) the relation between technological change and …
A threat-based cybersecurity risk assessment approach addressing SME needs
Cybersecurity incidents are commonplace nowadays, and Small-and Medium-Sized
Enterprises (SMEs) are exceptionally vulnerable targets. The lack of cybersecurity resources …
Enterprises (SMEs) are exceptionally vulnerable targets. The lack of cybersecurity resources …
Enhancing Software Supply Chain Resilience: Strategy For Mitigating Software Supply Chain Security Risks And Ensuring Security Continuity In Development …
This article delves into the strategic approaches and preventive measures necessary to
safeguard the software supply chain against evolving threats. It aims to foster an …
safeguard the software supply chain against evolving threats. It aims to foster an …
Novel Insights in the leadership in business and economics: A post-coronavirus update
Our world is evolving at an incredibly enormous speed and what was impossible three years
ago is now a reality. The concept of leadership and leaders has also undergone profound …
ago is now a reality. The concept of leadership and leaders has also undergone profound …
[HTML][HTML] Secure software development and testing: A model-based methodology
Modern industries widely rely upon software and IT services, in a context where cybercrime
is rapidly spreading in more and more sectors. Unfortunately, despite greater general …
is rapidly spreading in more and more sectors. Unfortunately, despite greater general …
Passphrase and keystroke dynamics authentication: Usable security
It was found that employees spend a total of 2.25 days within 60 days on password-related
activities. The time consumed by this is unproductive and has a negative impact on usability …
activities. The time consumed by this is unproductive and has a negative impact on usability …