A holistic review of cybersecurity and reliability perspectives in smart airports

N Koroniotis, N Moustafa, F Schiliro… - IEEE …, 2020 - ieeexplore.ieee.org
Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence
of smart airports. Services and systems powered by the IoT enable smart airports to have …

Review of cybersecurity assessment methods: Applicability perspective

R Leszczyna - Computers & Security, 2021 - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …

A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

Deepcva: Automated commit-level vulnerability assessment with deep multi-task learning

THM Le, D Hin, R Croft… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give
early warnings about potential security risks. However, there is a lack of effort to assess …

An overview of trends in information systems: Emerging technologies that transform the information technology industry

H Taherdoost - Taherdoost, H.(2023). An overview of trends in …, 2023 - papers.ssrn.com
Technology is mainly characterized by being changed rapidly. In other words, it is
recognized as the ever-changing playing field. Those who aim to stay in the technology field …

An empirical study of rule-based and learning-based approaches for static application security testing

R Croft, D Newlands, Z Chen, MA Babar - Proceedings of the 15th ACM …, 2021 - dl.acm.org
Background: Static Application Security Testing (SAST) tools purport to assist developers in
detecting security issues in source code. These tools typically use rule-based approaches to …

[HTML][HTML] Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach

O Alshaikh, S Parkinson, S Khan - Computers & Security, 2024 - Elsevier
Abstract Machine learning (ML) utilisation has achieved a vast global impact. This is evident
in the cybersecurity sector, where ML has wide-ranging applications, such as identifying and …

[HTML][HTML] A systematic review of cybersecurity assessment methods for HTTPS

A Zineddine, O Chakir, Y Sadqi, Y Maleh… - Computers and …, 2024 - Elsevier
Cybersecurity assessments are critical for ensuring that security measures in organizational
infrastructures, systems, and applications meet necessary requirements. Given the …

The intersection of Artificial Intelligence and cybersecurity: Challenges and opportunities

AD Sontan, SV Samuel - World Journal of Advanced Research and …, 2024 - wjarr.com
The fusion of artificial intelligence (AI) with cybersecurity represents a paradigm shift in our
efforts to safeguard digital assets against a dynamic threat landscape. This manuscript …

Automated software vulnerability assessment with concept drift

THM Le, B Sabir, MA Babar - 2019 IEEE/ACM 16th …, 2019 - ieeexplore.ieee.org
Software Engineering researchers are increasingly using Natural Language Processing
(NLP) techniques to automate Software Vulnerabilities (SVs) assessment using the …