Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Sravani Teja Bulusu"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 1, Iss 3, Pp 422-452 (2021)
An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The diversity of currently a
Externí odkaz:
https://doaj.org/article/0ef8b20917bb4def8606297c11802048
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 1, Iss 22, Pp 422-452 (2021)
Journal of Cybersecurity and Privacy
Journal of Cybersecurity and Privacy, MDPI, 2021, 1 (3), pp.422-452. ⟨10.3390/jcp1030022⟩
Volume 1
Issue 3
Pages 22-452
Journal of Cybersecurity and Privacy
Journal of Cybersecurity and Privacy, MDPI, 2021, 1 (3), pp.422-452. ⟨10.3390/jcp1030022⟩
Volume 1
Issue 3
Pages 22-452
International audience; An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The
Autor:
Abdelmalek Benzekri, Romain Laborde, Arnaud Oglaza, François Barrère, Sravani Teja Bulusu, Afonso Ferreira, Ahmad Samer Wazan
Publikováno v:
Handbook of Internet of Things
Handbook of Internet of Things, Springer, In press
HAL
Handbook of Internet of Things, Springer, In press
HAL
International audience; The increasing use of Industrial IOT (IIOT) solutions has led to an equal increase in the security risks associated with the connecteddevices. Security requirements engineering (SRE) aims at reducing these risks by implementin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::5e77a7c17fb15ffda9d6ac8dafb43ac2
https://hal.archives-ouvertes.fr/hal-03417339
https://hal.archives-ouvertes.fr/hal-03417339
Autor:
Ahmad Samer Wazan, Francois Barrere, Abdelmalek Benzekri, Romain Laborde, Sravani Teja Bulusu
Publikováno v:
SAC
Proceedings of SAC 2019
34th ACM/SIGAPP Symposium on Applied Computing (SAC 2019)
34th ACM/SIGAPP Symposium on Applied Computing (SAC 2019), Apr 2019, Limassol, Cyprus. pp.1610-1619
HAL
Proceedings of SAC 2019
34th ACM/SIGAPP Symposium on Applied Computing (SAC 2019)
34th ACM/SIGAPP Symposium on Applied Computing (SAC 2019), Apr 2019, Limassol, Cyprus. pp.1610-1619
HAL
International audience; In this paper, we propose a security methodology that automates the process of security zone specification and high-level network security requirements elicitation. We define a set of formalized rules derived from the principl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::66bf91ab411f86ac081ddf39e63d9455
https://oatao.univ-toulouse.fr/24856/
https://oatao.univ-toulouse.fr/24856/
Autor:
Abdelmalek Benzekri, Ahmad Samer Wazan, Francois Barrere, Romain Laborde, Sravani Teja Bulusu
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319770277
The significance of security requirements in building safety and security critical systems is widely acknowledged. However, given the multitude of security requirements engineering methodologies that exists today, selecting the best suitable methodol
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b312a9eddbe3dc87edc82200c2399a82
https://oatao.univ-toulouse.fr/22161/
https://oatao.univ-toulouse.fr/22161/
Autor:
Abdelmalek Benzekri, Ahmad Samer Wazan, Francois Barrere, Romain Laborde, Sravani Teja Bulusu
Publikováno v:
2017 1st Cyber Security in Networking Conference (CSNet)
Cyber Security in Networking Conference (CSNet)
Cyber Security in Networking Conference (CSNet), Oct 2017, Rio de Janeiro, Brazil. pp.0, ⟨10.1109/CSNET.2017.8241997⟩
CSNet
Cyber Security in Networking Conference (CSNet)
Cyber Security in Networking Conference (CSNet), Oct 2017, Rio de Janeiro, Brazil. pp.0, ⟨10.1109/CSNET.2017.8241997⟩
CSNet
International audience; Advanced Persistent Threats are increasingly becoming one of the major concerns to many industries and organizations. Currently, there exists numerous articles and industrial reports describing various case studies of recent n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::09d674e495b6d42b424346fe2a604efe
https://hal.archives-ouvertes.fr/hal-02863299/file/bulusu_22103.pdf
https://hal.archives-ouvertes.fr/hal-02863299/file/bulusu_22103.pdf
Autor:
Francois Barrere, Abdelmalek Benzekri, Ahmad Samer Wazan, Romain Laborde, Sravani Teja Bulusu
Publikováno v:
ARES
ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
12th International Conference on Availability, Reliability and Security (ARES 2017)
12th International Conference on Availability, Reliability and Security (ARES 2017), Aug 2017, Reggio Calabria, Italy. pp.1-6
HAL
ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
12th International Conference on Availability, Reliability and Security (ARES 2017)
12th International Conference on Availability, Reliability and Security (ARES 2017), Aug 2017, Reggio Calabria, Italy. pp.1-6
HAL
International audience; Since many decades, requirements engineering domain has seen significant enhancements towards adapting the security and risk analysis concepts. In this regard, there exist numerous security requirements engineering methodologi
Autor:
Abdelmalek Benzekri, Ahmad Samer Wazan, Romain Laborde, Sravani Teja Bulusu, Francois Barrere
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319548753
CRiSIS
CRiSIS 2016: Risks and Security of Internet and Systems
International Conference on Risks and Security of Internet and Systems (CRISIS 2016)
International Conference on Risks and Security of Internet and Systems (CRISIS 2016), Sep 2016, Roscoff, France. pp. 60-74
HAL
CRiSIS
CRiSIS 2016: Risks and Security of Internet and Systems
International Conference on Risks and Security of Internet and Systems (CRISIS 2016)
International Conference on Risks and Security of Internet and Systems (CRISIS 2016), Sep 2016, Roscoff, France. pp. 60-74
HAL
International audience; Over the past two decades, there has been a significant emphasis on the research work towards the amelioration within the discipline of security requirements engineering. Many researchers, international standards and organizat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2ce0888b9e10d91deb3c02055da1f05e
https://doi.org/10.1007/978-3-319-54876-0_5
https://doi.org/10.1007/978-3-319-54876-0_5
Autor:
Abdelmalek Benzekri, Francois Barrere, Ahmad Samer Wazan, Romain Laborde, Sravani Teja Bulusu
Publikováno v:
HAL
SAC
SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing
SAC 2018: The 33th ACM/SIGAPP Symposium on Applied Computing
SAC 2018: The 33th ACM/SIGAPP Symposium on Applied Computing, Apr 2018, Pau, France. pp.1316-1318
SAC
SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing
SAC 2018: The 33th ACM/SIGAPP Symposium on Applied Computing
SAC 2018: The 33th ACM/SIGAPP Symposium on Applied Computing, Apr 2018, Pau, France. pp.1316-1318
International audience; Considering the multitude of security requirements engineering methodologies available today, selecting a security requirement engineering methodology that fits the security engineering context becomes a promising task. In pre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fb871c161ff50d165a22846b79f090dc
https://hal.archives-ouvertes.fr/hal-02625471
https://hal.archives-ouvertes.fr/hal-02625471