SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Daneva Maya) "

Sökning: WFRF:(Daneva Maya)

  • Resultat 1-4 av 4
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Bjarnason, Elizabeth, et al. (författare)
  • Integrating Requirements Engineering with Software Development - A Research Abstract
  • 2012
  • Ingår i: ICB Research Reports. - 1860-2770. ; :46
  • Konferensbidrag (refereegranskat)abstract
    • Software development companies operating in market-driven domains need to deliver new and appealing software products at an increasing rate in order to stay competitive. This requires fast and efficient development of software for which the requirements are based on ever-changing market demands. Agile development claims to achieve increased development efficiency by performing the requirements engineering (RE) activities concurrently with design, planning and testing in an integrated fashion. However, coordination and communication is often reported as a challenge both for agile and for traditional RE practices. Increased insight into the factors affected by integrating RE may allow tailoring the degree of RE integration to suit specific project context, e.g. size, rate of requirements change, domain etc., and thereby support increased efficiency in software development. The aim of this research is to develop methods for assessing the level of RE integration and techniques for improving the integration of requirements. The research is performed in collaboration with industry and the developed methods and techniques will be empirically evaluated in an industrial setting.
  •  
2.
  •  
3.
  • Unterkalmsteiner, Michael, et al. (författare)
  • Preface : REFSQ 2024 Doctoral Symposium
  • 2024
  • Ingår i: CEUR Workshop Proceedings. - : Technical University of Aachen.
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)
  •  
4.
  • Zahid, Maryam, et al. (författare)
  • Security risks in cyber physical systems—A systematic mapping study
  • 2021
  • Ingår i: Journal of Software. - : John Wiley & Sons. - 2047-7473 .- 2047-7481. ; 33:9
  • Forskningsöversikt (refereegranskat)abstract
    • The increased need for constant connectivity and complete automation of existing systems fuels the popularity of Cyber Physical Systems (CPS) worldwide. Increasingly more, these systems are subjected to cyber attacks. In recent years, many major cyber‐attack incidents on CPS have been recorded and, in turn, have been raising concerns in their users' minds. Unlike in traditional IT systems, the complex architecture of CPS consisting of embedded systems integrated with the Internet of Things (IoT) requires rather extensive planning, implementation, and monitoring of security requirements. One crucial step to planning, implementing, and monitoring of these requirements in CPS is the integration of the risk management process in the CPS development life cycle. Existing studies do not clearly portray the extent of damage that the unattended security issues in CPS can cause or have caused, in the incidents recorded. An overview of the possible risk management techniques that could be integrated into the development and maintenance of CPS contributing to improving its security level in its actual environment is missing. In this paper, we are set out to highlight the security requirements and issues specific to CPS that are discussed in scientific literature and to identify the state‐of‐the‐art risk management processes adopted to identify, monitor, and control those security issues in CPS. For that, we conducted a systematic mapping study on the data collected from 312 papers published between 2000 and 2020, focused on the security requirements, challenges, and the risk management processes of CPS. Our work aims to form an overview of the security requirements and risks in CPS today and of those published contributions that have been made until now, towards improving the reliability of CPS. The results of this mapping study reveal (i) integrity authentication and confidentiality as the most targeted security attributes in CPS, (ii) model‐based techniques as the most used risk identification and assessment and management techniques in CPS, (iii) cyber‐security as the most common security risk in CPS, (iv) the notion of “mitigation measures” based on the type of system and the underline internationally recognized standard being the most used risk mitigation technique in CPS, (v) smart grids being the most targeted systems by cyber‐attacks and thus being the most explored domain in CPS literature, and (vi) one of the major limitations, according to the selected literature, concerns the use of the fault trees for fault representation, where there is a possibility of runtime system faults not being accounted for. Finally, the mapping study draws implications for practitioners and researchers based on the findings.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-4 av 4

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy