[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review

SM Khalil, H Bahsi, T Korõtko - Computers & Security, 2024 - Elsevier
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …

Modeling consumers' trust in mobile food delivery apps: perspectives of technology acceptance model, mobile service quality and personalization-privacy theory

DN Su, NAN Nguyen, LNT Nguyen, TT Luu… - Journal of Hospitality …, 2022 - Taylor & Francis
Considering the importance of customer trust in the m-commerce domain, this study aims to
examine the role of technology acceptance model (TAM) factors, mobile service quality (M …

Mobile app privacy in software engineering research: A systematic mapping study

F Ebrahimi, M Tushev, A Mahmoud - Information and Software Technology, 2021 - Elsevier
Context: Mobile applications (apps) have become deeply personal, constantly demanding
access to privacy-sensitive information in exchange for more personalized user …

P-STORE: Extension of STORE methodology to elicit privacy requirements

MTJ Ansari, A Baz, H Alhakami, W Alhakami… - Arabian Journal for …, 2021 - Springer
Implementing security and privacy requirements at every level of the software development
cycle is imperative for ensuring optimum usability as well as the users' satisfaction. Software …

Automatic generation of acceptance test cases from use case specifications: an nlp-based approach

C Wang, F Pastore, A Goknil… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Acceptance testing is a validation activity performed to ensure the conformance of software
systems with respect to their functional requirements. In safety critical systems, it plays a …

Detection of malicious software by analyzing the behavioral artifacts using machine learning algorithms

J Singh, J Singh - Information and Software Technology, 2020 - Elsevier
Malicious software deliberately affects the computer systems. Malware are analyzed using
static or dynamic analysis techniques. Using these techniques, unique patterns are …

Automatic code generation of MVC web applications

G Paolone, M Marinelli, R Paesani, P Di Felice - Computers, 2020 - mdpi.com
As Web applications become more and more complex, the development costs are
increasing as well. A Model Driven Architecture (MDA) approach is proposed in this paper …

Cifar-10 image classification with convolutional neural networks for embedded systems

RC Çalik, MF Demirci - 2018 IEEE/ACS 15th International …, 2018 - ieeexplore.ieee.org
Convolutional Neural Networks (CNN) have been successfully applied to image
classification problems. Although powerful, they require a large amount of memory. The …

Metamorphic testing for web system security

NB Chaleshtari, F Pastore, A Goknil… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Security testing aims at verifying that the software meets its security properties. In modern
Web systems, however, this often entails the verification of the outputs generated when …

Perceptions of ICT practitioners regarding software privacy

E Dias Canedo, A Toffano Seidel Calazans… - Entropy, 2020 - mdpi.com
During software development activities, it is important for Information and Communication
Technology (ICT) practitioners to know and understand practices and guidelines regarding …