Nothing Special   »   [go: up one dir, main page]

Khan et al., 2021 - Google Patents

Systematic mapping study on security approaches in secure software engineering

Khan et al., 2021

View PDF
Document ID
3780741373101571855
Author
Khan R
Khan S
Khan H
Ilyas M
Publication year
Publication venue
Ieee Access

External Links

Snippet

In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/30144Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Khan et al. Systematic mapping study on security approaches in secure software engineering
Matulevičius Fundamentals of secure system modelling
Elahi et al. A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
ben Othmane et al. Extending the agile development process to develop acceptably secure software
Ge et al. Agile development of secure web applications
Moffett et al. Core security requirements artefacts
Li et al. Security attack analysis using attack patterns
Mansourov et al. System assurance: beyond detecting vulnerabilities
AlQadheeb et al. Enhancing cybersecurity by generating user-specific security policy through the formal modeling of user behavior
De Faveri et al. Multi-paradigm deception modeling for cyber defense
Pauli et al. Threat-driven architectural design of secure information systems
Naqvi et al. Incorporating the human facet of security in developing systems and services
Busch Evaluating & engineering: an approach for the development of secure web applications
Xu et al. Threat-driven design and analysis of secure software architectures
Rodrigues et al. PTMOL: a suitable approach for modeling privacy threats in online social networks
Messe et al. An asset-based assistance for secure by design
Hansch Automating security risk and requirements management for cyber-physical systems
Bunke Security-Pattern Recognition and Validation
Sönmez et al. Reusable Security Requirements Repository Implementation Based on Application/System Components
Alkussayer Towards a secure software development framework based on an integrated engineering process
Parvanov From legislation to practice-a structured guide for the EU’s Cyber Resilience Act: Utilizing design science research to bridge theory and practice
Hayati et al. Modeling input validation in uml
Mouelhi Testing and Modeling Security Mechanisms in Web Applications
Memon et al. Techniques and Trends Towards Various Dimensions of Robust Security Testing in Global Software Engineering
Almagrabi et al. Optimizing Secure AI Lifecycle Model Management with Innovative Generative AI Strategies