You are currently viewing a new version of our website. To view the old version click .

320 Results Found

  • Article
  • Open Access
3 Citations
3,487 Views
13 Pages

24 August 2020

In the requirement engineering phase, the team members work to get the user requirements, comprehend them and specify them for the next process. There are many models for the requirement engineering phase. There is a need to select the best Requireme...

  • Review
  • Open Access
1,145 Views
23 Pages

Security Requirements Engineering: A Review and Analysis

  • Aftab Alam Janisar,
  • Ayman Meidan,
  • Khairul Shafee bin Kalid,
  • Abdul Rehman Gilal and
  • Aliza Bt Sarlan

9 October 2025

Security is crucial, especially as software systems become increasingly complex. Both practitioners and researchers advocate for the early integration of security requirements (SR) into the Software Development Life Cycle (SDLC). However, ensuring th...

  • Article
  • Open Access
44 Citations
8,636 Views
20 Pages

Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other systems. The heterogeneity of these systems increases the importance of security. Both the developer and the requirement analyst must consider details of not only t...

  • Article
  • Open Access
9 Citations
7,736 Views
31 Pages

A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context

  • Romain Laborde,
  • Sravani Teja Bulusu,
  • Ahmad Samer Wazan,
  • Arnaud Oglaza and
  • Abdelmalek Benzekri

An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The diversity of currently a...

  • Article
  • Open Access
2 Citations
1,663 Views
26 Pages

12 February 2025

In the digital era, cybersecurity is integral for preserving national security, digital privacy, and social sustainability. This research emphasizes the role of non-functional equirements (NFRs) in developing secure software systems that enhance soci...

  • Article
  • Open Access
6 Citations
8,490 Views
23 Pages

28 October 2022

Security requirements Engineering (SRE) is an activity conducted during the early stage of the SDLC. SRE involves eliciting, analyzing, and documenting security requirements. Thorough SRE can help software engineers incorporate countermeasures agains...

  • Article
  • Open Access
5 Citations
4,135 Views
25 Pages

A Framework for Cybersecurity Requirements Management in the Automotive Domain

  • Feng Luo,
  • Yifan Jiang,
  • Jiajia Wang,
  • Zhihao Li and
  • Xiaoxian Zhang

22 May 2023

The rapid development of intelligent connected vehicles has increased the attack surface of vehicles and made the complexity of vehicle systems unprecedented. Original equipment manufacturers (OEMs) need to accurately represent and identify threats a...

  • Article
  • Open Access
1,136 Views
25 Pages

Requirements Engineering Approach for Data Ownership Concepts

  • Jad Asswad,
  • Viktor Dmitriyev,
  • Maria Edith Elizondo Guerrero,
  • Cedrik Theesen and
  • Julia Köhlke

In recent years, the growing importance of data ownership has attracted significant attention, reflecting not only its pivotal role in the evolving data-driven environment but also the complexity of addressing it across diverse contexts. The necessit...

  • Article
  • Open Access
3 Citations
3,531 Views
39 Pages

21 May 2022

Current blockchain-based cloud (BBC) systems have several security vulnerabilities regarding smart contracts (SC), and several attacks have been reported recently. The SC development lacks standard design processes that follow software lifecycle prin...

  • Article
  • Open Access
31 Citations
12,524 Views
25 Pages

20 July 2020

With recent advancements of technologies such as Internet of Things and cloud computing, security of information systems has emerged as a critical issue. This has created a need for elicitation and analysis of the security requirements at an early st...

  • Article
  • Open Access
4 Citations
3,275 Views
16 Pages

4 April 2023

Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed...

  • Article
  • Open Access
18 Citations
7,821 Views
18 Pages

9 April 2020

This paper presents how Model-Based System Engineering (MBSE) could be leveraged in order to mitigate security risks at an early stage of system development. Primarily, MBSE was used to manage complex engineering projects in terms of system requireme...

  • Article
  • Open Access
6 Citations
3,322 Views
37 Pages

Leveraging Taxonomical Engineering for Security Baseline Compliance in International Regulatory Frameworks

  • Šarūnas Grigaliūnas,
  • Michael Schmidt,
  • Rasa Brūzgienė,
  • Panayiota Smyrli and
  • Vladislav Bidikov

7 October 2023

A surge in successful Information Security (IS) breaches targeting Research and Education (R&E) institutions highlights a pressing need for enhanced protection. Addressing this, a consortium of European National Research and Education Network (NR...

  • Article
  • Open Access
8 Citations
2,770 Views
20 Pages

A Hybrid-Cryptography Engine for Securing Intra-Vehicle Communications

  • Walter Tiberti,
  • Roberto Civino,
  • Norberto Gavioli,
  • Marco Pugliese and
  • Fortunato Santucci

6 December 2023

While technological advancements and their deep integration in connected and automated vehicles is a central aspect in the evolving trend of automotive industry, they also depict a growing size attack surface for malicious actors: the latter ones typ...

  • Article
  • Open Access
31 Citations
5,294 Views
28 Pages

3 March 2020

Applying Software Engineering (SE) processes is vital to critical and complex systems including security and networking systems. Nowadays, Wireless Sensor Networks (WSNs) and their applications are found in many military and civilian systems which ma...

  • Article
  • Open Access
12 Citations
4,893 Views
21 Pages

Zero-trust security architecture reconstructs the trust foundation of access control based on authentication and authorization by continuously authenticating the terminal during the authentication process and not relying solely on geographic location...

  • Article
  • Open Access
1,935 Views
18 Pages

14 November 2022

The launch vehicle industry has long been considered a pioneering industry in systems engineering. Launch vehicles are large complex systems that require a methodical multi-disciplinary approach to design, build, and launch. Launch vehicles are used...

  • Article
  • Open Access
29 Citations
14,257 Views
42 Pages

The development of Smart Grid systems has proven to be a challenging task. Besides the inherent technical complexity, the involvement of different stakeholders from different disciplines is a major challenge. In order to maintain the strict security...

  • Article
  • Open Access
22 Citations
6,448 Views
102 Pages

25 April 2023

An unmanned aerial vehicle (UAV) is an autonomous flying robot that has attracted the interest of several communities because of its capacity to increase the safety and productivity of labor. In terms of software engineering, UAV system development i...

  • Article
  • Open Access
20 Citations
4,008 Views
20 Pages

8 March 2023

Aviation is characterized by many stakeholders, long lifespans of its assets, and high requirements regarding safety, security, and documentation. To meet these requirements as well as customer needs, aircraft are regularly retrofitted with new cabin...

  • Article
  • Open Access
1 Citations
1,426 Views
18 Pages

25 February 2024

Variability in stream flow/discharge results in serious problems for engineers and difficulties in characterizing water systems under future climatic conditions. The management of water security in the engineering domain requires approaches aimed at...

  • Review
  • Open Access
217 Citations
148,913 Views
46 Pages

19 April 2023

The emergence of the Internet of Things (IoT) technology has brought about tremendous possibilities, but at the same time, it has opened up new vulnerabilities and attack vectors that could compromise the confidentiality, integrity, and availability...

  • Article
  • Open Access
319 Citations
64,623 Views
15 Pages

Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensiti...

  • Article
  • Open Access
6 Citations
4,693 Views
26 Pages

24 June 2021

The automotive sector is facing challenges in terms of the requirements for guaranteeing the safety and security of cars. In respect of the engineering process, it is challenging to incorporate functional safety, safety of the intended functionality,...

  • Article
  • Open Access
18 Citations
6,804 Views
15 Pages

A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations

  • Diego Carrillo-Torres,
  • Jesús Arturo Pérez-Díaz,
  • Jose Antonio Cantoral-Ceballos and
  • Cesar Vargas-Rosales

20 January 2023

Conventional authentication methods, like simple text-based passwords, have shown vulnerabilities to different types of security attacks. Indeed, 61% of all breaches involve credentials, whether stolen via social engineering or hacked using brute for...

  • Proceeding Paper
  • Open Access
633 Views
10 Pages

Assessing Advanced Propulsion Systems Using the Impact Monitor Framework

  • Utkarsh Gupta,
  • Atif Riaz,
  • Felix Brenner,
  • Thierry Lefebvre,
  • Patrick Ratei,
  • Marko Alder,
  • Prajwal Shiva Prakasha,
  • Lukas Weber,
  • Jordi Pons-Prats and
  • Dionysios Markatos

Presented in this paper is the Impact Monitor framework and interactive Dashboard Application (DA) validated through a use case, focusing on investigating the viability and competitiveness of future propulsion architectures for next-generation aircra...

  • Concept Paper
  • Open Access
16 Citations
5,436 Views
20 Pages

Realizing the Role of Permissioned Blockchains in a Systems Engineering Lifecycle

  • Demetrios Joannou,
  • Roy Kalawsky,
  • Miguel Martínez-García,
  • Chris Fowler and
  • Kevin Fowler

3 November 2020

A key requirement for an integrated digital tool chain is secure access and control of data assets. Not all stakeholders will have the same access to or control over the flow of information, some will be able to input or change data whilst others wil...

  • Review
  • Open Access
40 Citations
14,898 Views
14 Pages

26 November 2010

Cassava is a very important food crop that is capable of providing food security. However, a lot of problems prevent the development and use of modern equipment for its production. Most of the cassava produced still comes from peasant farmers who dep...

  • Review
  • Open Access
15 Citations
15,745 Views
19 Pages

Usable Security: A Systematic Literature Review

  • Francesco Di Nocera,
  • Giorgia Tempestini and
  • Matteo Orsini

30 November 2023

Usable security involves designing security measures that accommodate users’ needs and behaviors. Balancing usability and security poses challenges: the more secure the systems, the less usable they will be. On the contrary, more usable systems...

  • Article
  • Open Access
5 Citations
5,279 Views
19 Pages

Log files are essential assets for IT engineers engaged in the security of server and computer systems. They provide crucial information for identifying malicious events, conducting cybersecurity incident analyses, performing audits, system maintenan...

  • Article
  • Open Access
1 Citations
2,611 Views
20 Pages

14 October 2021

Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data. Fortunately, cloud computing can provide large storage and computation resources,...

  • Article
  • Open Access
4 Citations
1,719 Views
14 Pages

29 March 2024

The development of chemical industrial parks has resulted in the accumulation of a significant amount of hazardous substances, thereby increasing the demand for enhanced firefighting security, which directly relates to fire stations. This article pre...

  • Article
  • Open Access
6 Citations
4,207 Views
24 Pages

17 June 2022

The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research ho...

  • Article
  • Open Access
11 Citations
6,357 Views
17 Pages

25 January 2023

As industries in various sectors increasingly adopt model-based systems engineering (MBSE) for system lifecycle design and development, engineers can manage and describe systems of higher complexity than ever before. This is especially true for the f...

  • Review
  • Open Access
22 Citations
9,587 Views
43 Pages

18 December 2023

The increasing complexity and connectivity of automotive systems have raised concerns about their vulnerability to security breaches. As a result, the integration of formal methods and validation techniques has become crucial in ensuring the security...

  • Article
  • Open Access
6 Citations
3,589 Views
17 Pages

29 January 2023

The judgment of tunnel personnel’s safety status mainly requires the collection of construction personnel’s physical signs and cave environment data, and the early warning of abnormal status usually requires professional staff to make rap...

  • Article
  • Open Access
12 Citations
7,401 Views
13 Pages

Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia

  • Majid H. Alsulami,
  • Fawaz D. Alharbi,
  • Hamdan M. Almutairi,
  • Bandar S. Almutairi,
  • Mohammed M. Alotaibi,
  • Majdi E. Alanzi,
  • Khaled G. Alotaibi and
  • Sultan S. Alharthi

Social engineering is one of the most inventive methods of gaining unauthorized access to information systems and obtaining sensitive information. This type of cybersecurity threat requires minimal technical knowledge because it relies on the organiz...

  • Article
  • Open Access
6 Citations
2,415 Views
31 Pages

Introducing Security Mechanisms in OpenFog-Compliant Smart Buildings

  • Imanol Martín Toral,
  • Isidro Calvo,
  • Eneko Villar,
  • Jose Miguel Gil-García and
  • Oscar Barambones

Designing smart building IoT applications is a complex task. It requires efficiently integrating a broad number of heterogeneous, low-resource devices that adopt lightweight strategies. IoT frameworks, especially if they are standard-based, may help...

  • Article
  • Open Access
17 Citations
4,892 Views
19 Pages

A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks

  • Yahya Lambat,
  • Nick Ayres,
  • Leandros Maglaras and
  • Mohamed Amine Ferrag

29 September 2021

It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated...

  • Review
  • Open Access
1 Citations
3,290 Views
38 Pages

21 August 2022

Currently, abnormality detection and/or prediction is a very hot topic. In this paper, we addressed it in the frame of activity monitoring of a human in bed. This paper presents a comprehensive formulation of a requirements engineering dossier for a...

  • Article
  • Open Access
408 Views
28 Pages

Integrating the CRA into the IoT Lifecycle: Challenges, Strategies, and Best Practices

  • Miguel Ángel Ortega Velázquez,
  • Iris Cuevas Martínez and
  • Antonio J. Jara

22 November 2025

The European Union’s Cyber Resilience Act (CRA) introduces a complex set of binding lifecycle security obligations, presenting a significant compliance challenge for the Internet of Things (IoT) industry. This study addresses this challenge by...

  • Article
  • Open Access
37 Citations
9,519 Views
26 Pages

Smart Contract Engineering

  • Kai Hu,
  • Jian Zhu,
  • Yi Ding,
  • Xiaomin Bai and
  • Jiehua Huang

2 December 2020

A smart contract is the algorithmic description of a contractual transaction protocol that is automatically executed together with the information provided by its parties. It is written in a simplified programming language that is specific to a parti...

  • Article
  • Open Access
42 Citations
16,218 Views
23 Pages

A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions

  • Jahanzeb Shahid,
  • Muhammad Khurram Hameed,
  • Ibrahim Tariq Javed,
  • Kashif Naseer Qureshi,
  • Moazam Ali and
  • Noel Crespi

18 April 2022

The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications. This mammoth rise in their usage...

  • Review
  • Open Access
1 Citations
2,300 Views
20 Pages

Safety and Security Considerations for Online Laboratory Management Systems

  • Andrea Eugenia Pena-Molina and
  • Maria Mercedes Larrondo-Petrie

The pandemic forced educators to shift abruptly to distance learning, also referred to as e-learning education. Educational institutions integrated new educational tools and online platforms. Several schools, colleges, and universities began incorpor...

  • Article
  • Open Access
85 Citations
6,990 Views
31 Pages

26 February 2021

Blockchain technology has recently inspired remarkable attention due to its unique features, such as privacy, accountability, immutability, and anonymity, to name of the few. In contrast, core functionalities of most Internet of Things (IoT) resource...

  • Article
  • Open Access
2,435 Views
18 Pages

18 September 2022

Information technology equipment (ITE) processing sensitive information can have its security compromised by unintentional electromagnetic radiation. Appropriately assessing likelihood of a potential compromise relies on radio frequency (RF) engineer...

  • Article
  • Open Access
10 Citations
10,008 Views
26 Pages

The emergence of the COVID-19 pandemic in early 2020 has transformed how individuals work and learn and how they can apply cyber-security requirements in their, mostly remote, environments. This transformation also affected the university student pop...

  • Article
  • Open Access
1 Citations
2,599 Views
16 Pages

SRAM-based FPGA(Field Programmable Logic Arrays) requires external memory since its internal memory gets erased when power is cut off. The process of transmitting the circuit netlist in bitstream from external memory during power-up in FPGA is vulner...

  • Article
  • Open Access
5 Citations
2,038 Views
38 Pages

Trustworthy AI and Federated Learning for Intrusion Detection in 6G-Connected Smart Buildings

  • Rosario G. Garroppo,
  • Pietro Giuseppe Giardina,
  • Giada Landi and
  • Marco Ruta

23 April 2025

Smart building applications require robust security measures to ensure system functionality, privacy, and security. To this end, this paper proposes a Federated Learning Intrusion Detection System (FL-IDS) composed of two convolutional neural network...

of 7