Threat analysis of software systems: A systematic literature review

K Tuma, G Calikli, R Scandariato - Journal of Systems and Software, 2018 - Elsevier
Architectural threat analysis has become an important cornerstone for organizations
concerned with developing secure software. Due to the large number of existing techniques …

Systematic literature review on security risks and its practices in secure software development

RA Khan, SU Khan, HU Khan, M Ilyas - ieee Access, 2022 - ieeexplore.ieee.org
Security is one of the most critical aspects of software quality. Software security refers to the
process of creating and developing software that assures the integrity, confidentiality, and …

Exploring software security approaches in software development lifecycle: A systematic mapping study

NM Mohammed, M Niazi, M Alshayeb… - Computer Standards & …, 2017 - Elsevier
There is an increase use of security driven approaches to support software development
activities, such as requirements, design and implementation. The objective of this paper is to …

[HTML][HTML] Modeling security and privacy requirements: a use case-driven approach

PX Mai, A Goknil, LK Shar, F Pastore, LC Briand… - Information and …, 2018 - Elsevier
Context: Modern internet-based services, ranging from food-delivery to home-caring,
leverage the availability of multiple programmable devices to provide handy services …

Reusable knowledge in security requirements engineering: a systematic mapping study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts

M Riaz, J King, J Slankas… - 2014 IEEE 22nd …, 2014 - ieeexplore.ieee.org
Natural language artifacts, such as requirements specifications, often explicitly state the
security requirements for software systems. However, these artifacts may also imply …

Security requirements engineering framework with BPMN 2.0. 2 extension model for development of information systems

S Zareen, A Akram, S Ahmad Khan - Applied Sciences, 2020 - mdpi.com
Featured Application This work can be applied with the Requirements Engineering Process
to elicit the security requirements for an information system's development. Abstract With …

Formulating cybersecurity requirements for autonomous ships using the square methodology

J Yoo, Y Jo - Sensors, 2023 - mdpi.com
Artificial intelligence (AI) technology is crucial for developing autonomous ships in the
maritime industry. Autonomous ships, based on the collected information, recognize the …

Security assurance model of software development for global software development vendors

RA Khan, SU Khan, M Alzahrani, M Ilyas - Ieee Access, 2022 - ieeexplore.ieee.org
The number of security attacks and the impact has grown considerably in the recent several
years. As a result, new emerging software development models are required that assist in …

An effective security requirements engineering framework for cyber-physical systems

SU Rehman, V Gruhn - Technologies, 2018 - mdpi.com
Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other
systems. The heterogeneity of these systems increases the importance of security. Both the …