Challenges of securing Internet of Things devices: A survey

MG Samaila, M Neto, DAB Fernandes… - Security and …, 2018 - Wiley Online Library
The current vision of the Internet of Things (IoT) is to ensure that everything from everywhere
is connected to the Internet at all times using Internet Protocol (IP). This idea has the …

The practice of secure software development in SDLC: an investigation through existing model and a case study

NSA Karim, A Albuolayan, T Saba… - Security and …, 2016 - Wiley Online Library
Software security is an essential requirement for software systems. However, recent
investigation indicates that many software development methodologies do not explicitly …

A maturity model for secure requirements engineering

M Niazi, AM Saeed, M Alshayeb, S Mahmood… - Computers & …, 2020 - Elsevier
Security is considered to be a critical software quality attribute. Tackling security at the
requirements phase helps to avoid the need to rework secure software development issues …

A comprehensive view on quality characteristics of the IoT solutions

M Bures, X Bellekens, K Frajtak, BS Ahmed - EAI International Conference …, 2018 - Springer
Categorization of quality characteristics helps in a more effective structuring of the testing
process and in the determination of properties, which can be verified in the system under …

Using goal-question-metric (GQM) approach to assess security in cloud storage

F Yahya, RJ Walters, GB Wills - … , BC, Canada, November 30–December 3 …, 2017 - Springer
Assessing the security of data stored in cloud storage can be carried out by developing goal-
based measurement items. The measurement items can be utilized to construct a security …

A phase-wise review of software security metrics

SA Ansar, Alka, RA Khan - … and Data Knowledge Engineering: Volume 2, 2018 - Springer
Integrating securit y at each phase of the software Development Life cycle (SDLC) has
become an urgent need. Moreover, security must not be overlooked at early phases of …

[PDF][PDF] Towards a quantitative approach for security assurance metrics

GK Weldehawaryat, B Katt - The 12th International Conference on …, 2018 - researchgate.net
The need for effective and efficient evaluation schemes of security assurance is growing in
many organizations, especially Small and Medium Enterprises (SMEs). Although there are …

You cannot improve what you do not measure: A triangulation study of software security metrics

A Kudriavtseva, O Gadyatskaya - Proceedings of the 39th ACM/SIGAPP …, 2024 - dl.acm.org
When organizations invest in security, they need to monitor if their security program is
effective and helps them remediate vulnerabilities. For this purpose, many organizations …

A risk-driven investment model for analysing human factors in information security

R Mortazavi-Alavi - 2016 - repository.uel.ac.uk
Information systems are of high importance in organisations because of the revolutionary
industrial transformation undergone by digital and electronic platforms. A wide range of …

An Exploratory Study Gathering Security Requirements for the Software Development Process

R Andrade, J Torres, I Ortiz-Garcés, J Miño, L Almeida - Electronics, 2023 - mdpi.com
Software development stands out as one of the most rapidly expanding markets due to its
pivotal role in crafting applications across diverse sectors like healthcare, transportation, and …