Systematic map** study on security approaches in secure software engineering

RA Khan, SU Khan, HU Khan, M Ilyas - Ieee Access, 2021 - ieeexplore.ieee.org
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …

[HTML][HTML] Systematic literature review on security access control policies and techniques based on privacy requirements in a BYOD environment: State of the art and …

AT Ayedh M, AWA Wahab, MYI Idris - Applied Sciences, 2023 - mdpi.com
The number of devices connected within organisational networks through” Bring Your Own
Device”(BYOD) initiatives has steadily increased. BYOD security risks have resulted in …

Hybrid MCDM model for location of logistics hub: A case in China under the belt and road initiative

X Zhang, J Lu, Y Peng - Ieee Access, 2021 - ieeexplore.ieee.org
The location of logistics nodes that facilitate the China Railway Express (CRexpress) and
rail-sea intermodal transportation has received increasing attention in China under the Belt …

An integrated rough-fuzzy WINGS-ISM method with an application in ASSCM

M Wang, Y Zhang, Y Tian, K Zhang - Expert Systems with Applications, 2023 - Elsevier
Environmental deterioration, the COVID-19 pandemic and the Russian-Ukrainian conflict
had brought chronic and dramatic impacts on agricultural supply chain around the world …

[HTML][HTML] Internet of Things in healthcare: An adaptive ethical framework for IoT in digital health

A Wakili, S Bakkali - Clinical eHealth, 2024 - Elsevier
The emergence of the Internet of Things (IoT) has sparked a profound transformation in the
field of digital health, leading to the rise of the Internet of Medical Things (IoMT). These IoT …

A novel security framework to mitigate and avoid unexpected security threats in saudi arabia

A Alshammari - Engineering, Technology & Applied Science Research, 2023 - etasr.com
Many organizations around the world suffer large losses due to unexpected risks which can
have a profound impact on their survival. This paper presents a novel security framework to …

Risk evaluation and attack detection in heterogeneous IoMT devices using hybrid fuzzy logic analytical approach

Pritika, B Shanmugam, S Azam - Sensors, 2024 - mdpi.com
The rapidly expanding Internet of Medical Things (IoMT) landscape fosters enormous
opportunities for personalized healthcare, yet it also exposes patients and healthcare …

Information security maturity model for healthcare organizations in the United States

B Barnes, T Daim - IEEE Transactions on Engineering …, 2022 - ieeexplore.ieee.org
Thisarticle provides a maturity model for information security for healthcare organizations in
the United States. Healthcare organizations are faced with increasing threats to the security …

[HTML][HTML] Security management of BYOD and cloud environment in Saudi Arabia

K Almarhabi, A Bahaddad, AM Alghamdi - Alexandria Engineering Journal, 2023 - Elsevier
The increasing trend of Bring Your Own Device (BYOD) to work has led to a significant surge
in the risks related to network security. This trend is very beneficial to employers and …

A framework of software project scope definition elements: An ISM-DEMATEL approach

IU Hassan, S Asghar - IEEE Access, 2021 - ieeexplore.ieee.org
Software project scope definition is complicated due to the diversity and magnitude of the
information needed. An inadequate scope definition often results in project failure as it …