Systematic literature review on security risks and its practices in secure software development

RA Khan, SU Khan, HU Khan, M Ilyas - ieee Access, 2022 - ieeexplore.ieee.org
Security is one of the most critical aspects of software quality. Software security refers to the
process of creating and developing software that assures the integrity, confidentiality, and …

A systematic review and analytical evaluation of security requirements engineering approaches

MN Anwar Mohammad, M Nazir, K Mustafa - Arabian Journal for Science …, 2019 - Springer
Security is an inevitable concern in today's scenario of software-based application's
pervasiveness and development practices. Researchers and practitioners frequently …

Contradictions Identification of Safety and Security Requirements for Industrial Cyber-Physical Systems

Z Sun, Y Ding, K Pei, SH Yang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Industrial cyber–physical systems (iCPSs) are the backbone of the fourth industrial
revolution, facing more safety and security (S&S) challenges compared to traditional …

[PDF][PDF] Black box evaluation of web application scanners: Standards mapping approach

M Qasaimeh, A Shamlawi… - Journal of Theoretical and …, 2018 - researchgate.net
ABSTRACT The Secure Development Life Cycle (SDLC) of web applications aims to
enhance the quality attributes of released applications. Security is among of the important …

Secure paradigm for web application development

B Subedi, A Alsadoon, PWC Prasad… - 2016 15th RoEduNet …, 2016 - ieeexplore.ieee.org
Security protection is usually thought to be a separate process in web application
development phases but the external security protection mechanisms are not effective to …

Proposed Secure 3-Use Case Diagram

M Gedam, BB Meshram - … Journal of Systems and Software Security …, 2022 - igi-global.com
The global use of UML diagrams serving as a baseline for the development of software
leads to the mandatory consideration of non-functional requirements providing a secure and …

[PDF][PDF] Unravelling the dynamic complexity of cyber-security: Towards identifying core systemic structures driving cyber-security investment decision-making

S Zeijlemaker - 2022 - repository.ubn.ru.nl
This dissertation and the related research would not have been possible without the support
of many people in my environment. I therefore want to thank everyone involved for their help …

Application Design for Food and Beverage Online Delivery System Based of Android Framework

A Manan, V Wiley, T Lucas - JUITA: Jurnal Informatika, 2019 - jurnalnasional.ump.ac.id
Providing good services and satisfaction to customer is main concern on online business. As
technology is developed rapidly, many online restaurants has sought user-friendly platform …

Security Implications of User Non-compliance Behavior to Software Updates: A Risk Assessment Study

M Tamanna, JD Stephens, M Anwar - arXiv preprint arXiv:2411.06262, 2024 - arxiv.org
Software updates are essential to enhance security, fix bugs, and add better features to
existing software. However, while some users comply and update their systems upon …

A novel method: Ontology-based security requirements engineering framework

P Salini, S Kanmani - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Software systems security is often exploited by threats through vulnerabilities of the systems.
This reveals the necessity of eliciting and analyzing security requirements in the …