Cited By
View all- Singh KSaxena RKumar B(2024)AI Security: Cyber Threats and Threat-Informed Defense2024 8th Cyber Security in Networking Conference (CSNet)10.1109/CSNet64211.2024.10851770(305-312)Online publication date: 4-Dec-2024
In this presentation, I describe how the SEI's Security Engineering Risk Analysis (SERA) method provides a structure that connects desired system functionality with the underlying software to evaluate the sufficiency of requirements for software ...
This research work presents existing security ontologies and identifies relevant security ontology requirements in information systems. Moreover, it proposes a new classification of security ontologies in which, two main families, namely ontologies-...
DevOps has emerged as one of the most rapidly evolving software development paradigms. With the growing concerns surrounding security in software systems, the DevSecOps paradigm has gained prominence, urging practitioners to incorporate security practices ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in