Skip Content
You are currently on the new version of our website. Access the old version .

6,784 Results Found

  • Review
  • Open Access
1,620 Views
23 Pages

Security Requirements Engineering: A Review and Analysis

  • Aftab Alam Janisar,
  • Ayman Meidan,
  • Khairul Shafee bin Kalid,
  • Abdul Rehman Gilal and
  • Aliza Bt Sarlan

9 October 2025

Security is crucial, especially as software systems become increasingly complex. Both practitioners and researchers advocate for the early integration of security requirements (SR) into the Software Development Life Cycle (SDLC). However, ensuring th...

  • Article
  • Open Access
44 Citations
8,766 Views
20 Pages

Context and motivation: Cyber-Physical Systems (CPSs) are gaining priority over other systems. The heterogeneity of these systems increases the importance of security. Both the developer and the requirement analyst must consider details of not only t...

  • Article
  • Open Access
8 Citations
8,876 Views
23 Pages

28 October 2022

Security requirements Engineering (SRE) is an activity conducted during the early stage of the SDLC. SRE involves eliciting, analyzing, and documenting security requirements. Thorough SRE can help software engineers incorporate countermeasures agains...

  • Article
  • Open Access
106 Citations
13,131 Views
35 Pages

Security Requirements for the Internet of Things: A Systematic Approach

  • Shantanu Pal,
  • Michael Hitchens,
  • Tahiry Rabehaja and
  • Subhas Mukhopadhyay

19 October 2020

There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection betwee...

  • Article
  • Open Access
4 Citations
3,233 Views
29 Pages

Towards Cross-Standard Compliance Readiness: Security Requirements Model for Smart Grid

  • Milan Stojkov,
  • Nikola Dalčeković,
  • Branko Markoski,
  • Branko Milosavljević and
  • Goran Sladić

20 October 2021

The critical infrastructure is constantly under cyber and physical threats. Applying security controls without guidance or traceability can create a false sense of security. Security standards facilitate security knowledge and control best practices...

  • Article
  • Open Access
33 Citations
12,732 Views
25 Pages

20 July 2020

With recent advancements of technologies such as Internet of Things and cloud computing, security of information systems has emerged as a critical issue. This has created a need for elicitation and analysis of the security requirements at an early st...

  • Article
  • Open Access
9 Citations
7,920 Views
31 Pages

A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context

  • Romain Laborde,
  • Sravani Teja Bulusu,
  • Ahmad Samer Wazan,
  • Arnaud Oglaza and
  • Abdelmalek Benzekri

An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The diversity of currently a...

  • Article
  • Open Access
656 Views
20 Pages

Assessment of Regulation Capacity Requirements for Sending-End Grids Considering Frequency Security

  • Min Li,
  • Xiaodi Wang,
  • Fang Liu,
  • Xiaming Guo,
  • Dawei Chen and
  • Yunfeng Wen

7 July 2025

With the large-scale integration of converter-based renewable energy into power systems and the large-scale construction of HVDC, risks associated with supply–demand imbalance and post-contingency frequency instability of sending-end power grid...

  • Article
  • Open Access
2 Citations
6,638 Views
15 Pages

As COVID-19 became a pandemic worldwide, contact tracing technologies and information systems were developed for quick control of infectious diseases in both the private and public sectors. This study aims to strengthen the data subject’s secur...

  • Article
  • Open Access
3 Citations
2,135 Views
17 Pages

In recent years, microservices, as an emerging technology in software development, have been favored by developers due to their lightweight and low-coupling features, and have been rapidly applied to the Internet of Things (IoT) and Internet of Vehic...

  • Article
  • Open Access
133 Views
24 Pages

15 January 2026

Security requirements play a critical role in ensuring the trustworthiness and resilience of software systems; however, their automatic classification remains challenging due to limited labeled data, confidentiality constraints, and the heterogeneous...

  • Review
  • Open Access
10 Citations
17,214 Views
37 Pages

10 July 2023

The number of devices connected within organisational networks through ”Bring Your Own Device” (BYOD) initiatives has steadily increased. BYOD security risks have resulted in significant privacy and security issues impacting organisationa...

  • Article
  • Open Access
2 Citations
1,851 Views
26 Pages

12 February 2025

In the digital era, cybersecurity is integral for preserving national security, digital privacy, and social sustainability. This research emphasizes the role of non-functional equirements (NFRs) in developing secure software systems that enhance soci...

  • Article
  • Open Access
834 Views
28 Pages

Optimal Planning and Investment Return Analysis of Grid-Side Energy Storage System Addressing Multi-Dimensional Grid Security Requirements

  • Tianhan Zhang,
  • Junfei Wu,
  • Jianjun Hong,
  • Hang Zhou,
  • Jianfeng Zheng,
  • Zhenhua Zheng,
  • Chengeng Niu,
  • Zhihai Gao,
  • Lizhuo Peng and
  • Zhenzhi Lin

10 November 2025

To address the challenges posed to the secure and reliable operation of the power grid under the “dual-carbon” goals, an optimal planning and investment return analysis method for grid-side energy storage system (GSESS) is proposed, with...

  • Article
  • Open Access
1 Citations
2,394 Views
18 Pages

13 November 2023

To ensure the security of information exchange in software-defined optical networks, quantum key distribution (QKD) based on quantum mechanics is introduced. However, the slow and valuable process of generating quantum key resources contradicts the h...

  • Review
  • Open Access
42 Citations
14,615 Views
28 Pages

Review of Offline Payment Function of CBDC Considering Security Requirements

  • Yeonouk Chu,
  • Jaeho Lee,
  • Sungjoong Kim,
  • Hyunjoong Kim,
  • Yongtae Yoon and
  • Hyeyoung Chung

28 April 2022

Due to the growth of the internet and communication technologies, electronic financial systems are becoming popular. Physical cash is losing its preeminence, and digital numbers on computers represent money. However, electronic financial systems, mos...

  • Article
  • Open Access
3 Citations
3,551 Views
13 Pages

24 August 2020

In the requirement engineering phase, the team members work to get the user requirements, comprehend them and specify them for the next process. There are many models for the requirement engineering phase. There is a need to select the best Requireme...

  • Article
  • Open Access
2 Citations
2,719 Views
25 Pages

23 January 2023

As the world becomes digitized and connected, cyberattacks and security issues have been steadily increasing. In particular, advanced persistent threats (APTs) are actors who perform various complex attacks over the long term to achieve their purpose...

  • Article
  • Open Access
11 Citations
2,454 Views
27 Pages

Explainable Security Requirements Classification Through Transformer Models

  • Luca Petrillo,
  • Fabio Martinelli,
  • Antonella Santone and
  • Francesco Mercaldo

3 January 2025

Security and non-security requirements are two critical issues in software development. Classifying requirements is crucial as it aids in recalling security needs during the early stages of development, ultimately leading to enhanced security in the...

  • Review
  • Open Access
191 Citations
19,057 Views
43 Pages

Security Requirements and Challenges of 6G Technologies and Applications

  • Shimaa A. Abdel Hakeem,
  • Hanan H. Hussein and
  • HyungWon Kim

2 March 2022

After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-...

  • Article
  • Open Access
2 Citations
3,897 Views
18 Pages

An Exploratory Study Gathering Security Requirements for the Software Development Process

  • Roberto Andrade,
  • Jenny Torres,
  • Iván Ortiz-Garcés,
  • Jorge Miño and
  • Luis Almeida

25 August 2023

Software development stands out as one of the most rapidly expanding markets due to its pivotal role in crafting applications across diverse sectors like healthcare, transportation, and finance. Nevertheless, the sphere of cybersecurity has also unde...

  • Review
  • Open Access
18 Citations
6,859 Views
32 Pages

Network slicing empowers 5G with enhanced network performance and efficiency, cost saving, and better QoS and customer satisfaction, and expands the commercial application scenarios of 5G networks. However, the introduction of new techniques usually...

  • Review
  • Open Access
100 Citations
11,288 Views
25 Pages

Towards a Secure and Sustainable Internet of Medical Things (IoMT): Requirements, Design Challenges, Security Techniques, and Future Trends

  • Bharat Bhushan,
  • Avinash Kumar,
  • Ambuj Kumar Agarwal,
  • Amit Kumar,
  • Pronaya Bhattacharya and
  • Arun Kumar

3 April 2023

Recent advances in machine-to-machine (M2M) communications, mini-hardware manufacturing, and micro computing have led to the development of the Internet of Things (IoT). The IoT is integrated with medical devices in order to enable better treatment,...

  • Review
  • Open Access
81 Citations
16,900 Views
49 Pages

28 August 2023

The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing dev...

  • Article
  • Open Access
1 Citations
1,367 Views
34 Pages

This paper presents a systematic methodology for identifying and integrating safety and security requirements in autonomous driving systems, demonstrated through the case of an autonomous intersection. The study focuses on modeling the intelligent in...

  • Article
  • Open Access
32 Citations
6,639 Views
16 Pages

An Analysis of the Water-Energy-Food-Land Requirements and CO2 Emissions for Food Security of Rice in Japan

  • Sang-Hyun Lee,
  • Makoto Taniguchi,
  • Rabi H. Mohtar,
  • Jin-Yong Choi and
  • Seung-Hwan Yoo

19 September 2018

The aim of this study is to assess the impact of rice-based food security on water, energy, land, and CO2 emissions from a holistic point of view using the Nexus approach, which analyzes tradeoffs between water, energy, and food management. In Japan,...

  • Article
  • Open Access
5 Citations
4,304 Views
25 Pages

A Framework for Cybersecurity Requirements Management in the Automotive Domain

  • Feng Luo,
  • Yifan Jiang,
  • Jiajia Wang,
  • Zhihao Li and
  • Xiaoxian Zhang

22 May 2023

The rapid development of intelligent connected vehicles has increased the attack surface of vehicles and made the complexity of vehicle systems unprecedented. Original equipment manufacturers (OEMs) need to accurately represent and identify threats a...

  • Article
  • Open Access
3 Citations
3,609 Views
39 Pages

21 May 2022

Current blockchain-based cloud (BBC) systems have several security vulnerabilities regarding smart contracts (SC), and several attacks have been reported recently. The SC development lacks standard design processes that follow software lifecycle prin...

  • Review
  • Open Access
74 Citations
10,712 Views
48 Pages

A Comprehensive Survey on Security and Privacy for Electronic Health Data

  • Se-Ra Oh,
  • Young-Duk Seo,
  • Euijong Lee and
  • Young-Gab Kim

Recently, the integration of state-of-the-art technologies, such as modern sensors, networks, and cloud computing, has revolutionized the conventional healthcare system. However, security concerns have increasingly been emerging due to the integratio...

  • Review
  • Open Access
37 Citations
12,896 Views
57 Pages

A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives

  • Mahmud Hossain,
  • Golam Kayas,
  • Ragib Hasan,
  • Anthony Skjellum,
  • Shahid Noor and
  • S. M. Riazul Islam

24 January 2024

Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used...

  • Review
  • Open Access
108 Citations
49,736 Views
20 Pages

Businesses are reliant on data to survive in the competitive market, and data is constantly in danger of loss or theft. Loss of valuable data leads to negative consequences for both individuals and organizations. Cybersecurity is the process of prote...

  • Article
  • Open Access
49 Citations
10,650 Views
21 Pages

6 September 2018

The increasing proliferation of distributed energy resources (DERs) on the smart grid has made distributed solar and wind two key contributors to the expanding attack surface of the network; however, there is a lack of proper understanding and enforc...

  • Article
  • Open Access
10 Citations
817 Views
13 Pages

It is widely recognised that successful online systems are not those that simply fulfil some functional specifications, but rather systems that are developed to also meet a number of non-functional requirements such as security, reliability and trust...

  • Article
  • Open Access
44 Citations
4,217 Views
20 Pages

A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks

  • Mahmood A. Al-Shareeda,
  • Mohammed Anbar,
  • Selvakumar Manickam and
  • Iznan H. Hasbullah

22 February 2022

Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks. Achieving rapid message signing and verification for...

  • Article
  • Open Access
23 Citations
4,576 Views
27 Pages

22 March 2020

Privacy preserving data publishing has received considerable attention for publishing useful information while preserving data privacy. The existing privacy preserving data publishing methods for multiple sensitive attributes do not consider the situ...

  • Article
  • Open Access
23 Citations
6,175 Views
19 Pages

24 May 2023

Artificial intelligence (AI) technology is crucial for developing autonomous ships in the maritime industry. Autonomous ships, based on the collected information, recognize the environment without any human intervention and operate themselves using t...

  • Article
  • Open Access
7 Citations
2,218 Views
35 Pages

24 January 2024

Process algebra can be considered one of the most practical formal methods for modeling Smart IoT Systems in Digital Twin, since each IoT device in the systems can be considered as a process. Further, some of the algebras are applied to predict the b...

  • Review
  • Open Access
72 Citations
8,894 Views
31 Pages

Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions

  • Pintu Kumar Sadhu,
  • Venkata P. Yanambaka,
  • Ahmed Abdelgawad and
  • Kumar Yelamarthi

24 July 2022

With the widespread and increasing use of Internet-of-Things (IoT) devices in all aspects of daily life, a hopeful future for people, data, and processes is emerging. Extensive spans allow for an integrated life cycle to be created from home to enter...

  • Article
  • Open Access
19 Citations
16,359 Views
17 Pages

28 May 2024

Intelligent Transportation Systems (ITS) first appeared in 1868 with traffic lights. With developing technology, the need to bring a smart approach to transportation applications within the scope of speed and environmental protection has emerged. Pro...

  • Review
  • Open Access
11 Citations
5,005 Views
33 Pages

29 April 2025

Internet of Medical Things (IoMT) is a rapidly evolving field with the potential to bring significant changes to healthcare. While several surveys have examined the structure and operation of these systems, critical aspects such as interoperability,...

  • Article
  • Open Access
23 Citations
4,092 Views
30 Pages

19 January 2021

5G-Vehicle-to-Everything (5G-V2X) supports high-reliability and low latency autonomous services and applications. Proposing an efficient security solution that supports multi-zone broadcast authentication and satisfies the 5G requirement is a critica...

  • Review
  • Open Access
8 Citations
6,254 Views
32 Pages

Mapping of Industrial IoT to IEC 62443 Standards

  • Ivan Cindrić,
  • Marko Jurčević and
  • Tamara Hadjina

25 January 2025

The increasing adoption of the Industrial Internet of Things (IIoT) has led to significant improvements in operational efficiency but has also brought new challenges for cybersecurity. To address these challenges, a number of standards have been intr...

  • Article
  • Open Access
8 Citations
3,402 Views
21 Pages

3 January 2023

Security and performance (SAP) are two critical NFRs that affect the successful completion of software projects. Organizations need to follow the practices that are vital to SAP verification. These practices must be incorporated into the software dev...

  • Article
  • Open Access
28 Citations
5,444 Views
17 Pages

20 April 2019

Due to the rapid development of Internet of Things (IoT), IoT platforms that can provide common functions for things are becoming increasingly important. However, access control frameworks in diverse IoT platforms have been developed for individual s...

  • Review
  • Open Access
115 Citations
16,105 Views
27 Pages

Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

  • Mohamed S. Abdalzaher,
  • Karim Seddik,
  • Maha Elsabrouty,
  • Osamu Muta,
  • Hiroshi Furukawa and
  • Adel Abdel-Rahman

29 June 2016

We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using ga...

  • Review
  • Open Access
17 Citations
9,228 Views
31 Pages

14 March 2021

During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However, the public availability of data stored on the blockchain and its link t...

  • Review
  • Open Access
57 Citations
15,555 Views
44 Pages

3 March 2024

The evolution of Patient-Generated Health Data (PGHD) represents a major shift in healthcare, fueled by technological progress. The advent of PGHD, with technologies such as wearable devices and home monitoring systems, extends data collection beyond...

  • Article
  • Open Access
19 Citations
7,066 Views
15 Pages

3 April 2015

The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are theoretically information-secure are qua...

  • Article
  • Open Access
2 Citations
3,293 Views
15 Pages

12 October 2021

The article presented the issue of securing semi-trailer trucks and trailers during their transport using intermodal railway wagons as a part of combined transport. This issue was analysed in different operational conditions related to loading level,...

  • Article
  • Open Access
2,565 Views
14 Pages

20 May 2020

The Chinese government set up a redline for water resources in 2011, mandating water withdrawals and management criteria to the year 2030. ‘How much water is required to produce sufficient crop to feed a 1.6 billion population in 2030?’ b...

of 136