Cyber-physical systems security: A systematic review

H Harkat, LM Camarinha-Matos, J Goes… - Computers & Industrial …, 2024 - Elsevier
In recent years, cyber-physical systems (CPS) have been to many vital areas, including
medical devices, smart cars, industrial systems, energy grid, etc. As these systems …

Systematic mapping of the literature on secure software development

H Nina, JA Pow-Sang, M Villavicencio - IEEE Access, 2021 - ieeexplore.ieee.org
The accelerated growth in exploiting vulnerabilities due to errors or failures in the software
development process is a latent concern in the Software Industry. In this sense, this study …

[HTML][HTML] CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems

ÁJ Varela-Vaca, DG Rosado, LE Sánchez… - Computers in …, 2021 - Elsevier
In the last years, cyber-physical systems (CPS) are receiving substantial mainstream
attention especially in industrial environments, but this popularity has been accompanied by …

Multicriteria decision making taxonomy of cloud-based global software development motivators

MA Akbar, H Alsalman, AA Khan, S Mahmood… - IEEE …, 2020 - ieeexplore.ieee.org
The software organizations widely consider the cloud based global software development
(CGSD) as it offer the quality projects with low cast. The adoption of CGSD is challenging …

A robust framework for cloud‐based software development outsourcing factors using analytical hierarchy process

MA Akbar, AA Khan, S Mahmood… - Journal of Software …, 2021 - Wiley Online Library
Managing the cloud‐based software development outsourcing (CSDO) activities across the
geographically distributed development sites are much challenging. This study aims to …

Readiness model for requirements change management in global software development

MA Akbar, S Mahmood, Z Huang… - Journal of Software …, 2020 - Wiley Online Library
Abstract Requirements Change Management (RCM) is one of the challenges faced by
Global Software Development (GSD) organisations as requirements evolution is inevitable …

Prioritization of global software requirements' engineering barriers: An analytical hierarchy process

MA Akbar, W Naveed, S Mahmood, S Rafi… - IET …, 2021 - Wiley Online Library
Software industry is adopting global software development (GSD) due to its potential to
produce quality products at a lower cost. However, the GSD firms face many challenges that …

Post-merger integration specific requirements engineering model

K Lace, M Kirikova - Perspectives in Business Informatics Research: 20th …, 2021 - Springer
A goal of post-merger integration (PMI) is to combine several companies into one common
entity so that Mergers and Acquisitions (M&A) strategic objectives can be achieved (some …

The impact of controlled vocabularies on requirements engineering activities: a systematic mapping study

A Ahmad, JLB Justo, C Feng, AA Khan - Applied Sciences, 2020 - mdpi.com
Context: The use of controlled vocabularies (CVs) aims to increase the quality of the
specifications of the software requirements, by producing well-written documentation to …

A survey on SQL injection attacks, detection and prevention techniques-a tertiary study

M Hallo, G Suntaxi - International Journal of Security and …, 2022 - inderscienceonline.com
This paper presents a tertiary systematic literature review of SQL injection attacks based on
previous secondary systematic literature reviews and systematic mappings. We identify the …