[PDF][PDF] Product-line engineering for smart manufacturing: A systematic mapping study on security concepts

R May, AJ Alex, R Suresh, T Leich - International Conference on …, 2024 - researchgate.net
The growing configurability of smart-manufacturing software systems (SMSS) introduces a
variety of security concerns. Although there is an ever-increasing risk for exploiting …

A product-line-engineering framework for secure enterprise-resource-planning systems

R May, C Biermann, A Kenner, J Krüger… - Procedia Computer …, 2024 - Elsevier
Abstract Enterprise-resource-planning (ERP) systems are highly complex, incorporating
critical data and configuration options that can easily cause security threats or risks. While …

Vulnerably (mis) configured? Exploring 10 years of developers' Q&As on Stack Overflow

R May, C Biermann, XM Zerweck, K Ludwig… - Proceedings of the 18th …, 2024 - dl.acm.org
The increasing number of attacks exploiting system vulnerabilities in recent years underpins
the growing importance of security; especially for software comprising configuration options …

A Practitioners Perspective on Addressing Cyber Security and Variability Challenges in Modern Automotive Systems

P Zellmer, L Holsten, R May, T Leich - Proceedings of the 18th …, 2024 - dl.acm.org
Modern cars are becoming increasingly software-driven and interconnected, including new
innovative functions, such as over-the-air updates. Such functions are typically based on …

SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security

R May, J Krüger, T Leich - … of the 19th International Conference on …, 2024 - dl.acm.org
In the past years, a growing number of highly-automated systems has build on Artificial-
Intelligence (AI) capabilities, for example, self-driving vehicles or predictive health-state …

Conversational Agents in Healthcare: A Variability Perspective

R May, K Denecke - Proceedings of the 18th International Working …, 2024 - dl.acm.org
Conversational agents in healthcare are gaining popularity, for example, in the context of
eliciting medical histories. Furthermore, due to the growing diversity of use cases and …

Enhancing Network Security Through Moving Target Defense Technology: An Analysis of the Impact on Attack Level

S Izadi, M Izadi, G Ranjbaran… - 2023 7th International …, 2023 - ieeexplore.ieee.org
In recent years, the increasing importance of computer system security has been
emphasized due to the rising threat landscape. Despite the implementation of various …

Identifying Reusable Core Assets of Digital Health Apps

R May, R Glauser, K Denecke - Digital Health and Informatics …, 2024 - ebooks.iospress.nl
Abstract Despite their variability, Digital Health Apps (DHAs) typically share functionalities
(ie core assets) and can thus be considered as a family of similar products with unique …