Khan et al., 2021 - Google Patents
Systematic mapping study on security approaches in secure software engineeringKhan et al., 2021
View PDF- Document ID
- 3780741373101571855
- Author
- Khan R
- Khan S
- Khan H
- Ilyas M
- Publication year
- Publication venue
- Ieee Access
External Links
Snippet
In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that …
- 230000018109 developmental process 0 abstract description 62
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khan et al. | Systematic mapping study on security approaches in secure software engineering | |
Matulevičius | Fundamentals of secure system modelling | |
Elahi et al. | A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities | |
ben Othmane et al. | Extending the agile development process to develop acceptably secure software | |
Ge et al. | Agile development of secure web applications | |
Moffett et al. | Core security requirements artefacts | |
Li et al. | Security attack analysis using attack patterns | |
Mansourov et al. | System assurance: beyond detecting vulnerabilities | |
AlQadheeb et al. | Enhancing cybersecurity by generating user-specific security policy through the formal modeling of user behavior | |
De Faveri et al. | Multi-paradigm deception modeling for cyber defense | |
Pauli et al. | Threat-driven architectural design of secure information systems | |
Naqvi et al. | Incorporating the human facet of security in developing systems and services | |
Busch | Evaluating & engineering: an approach for the development of secure web applications | |
Xu et al. | Threat-driven design and analysis of secure software architectures | |
Rodrigues et al. | PTMOL: a suitable approach for modeling privacy threats in online social networks | |
Messe et al. | An asset-based assistance for secure by design | |
Hansch | Automating security risk and requirements management for cyber-physical systems | |
Bunke | Security-Pattern Recognition and Validation | |
Sönmez et al. | Reusable Security Requirements Repository Implementation Based on Application/System Components | |
Alkussayer | Towards a secure software development framework based on an integrated engineering process | |
Parvanov | From legislation to practice-a structured guide for the EU’s Cyber Resilience Act: Utilizing design science research to bridge theory and practice | |
Hayati et al. | Modeling input validation in uml | |
Mouelhi | Testing and Modeling Security Mechanisms in Web Applications | |
Memon et al. | Techniques and Trends Towards Various Dimensions of Robust Security Testing in Global Software Engineering | |
Almagrabi et al. | Optimizing Secure AI Lifecycle Model Management with Innovative Generative AI Strategies |