-
1
Catalogue-based guideline for misuse case
Published 2022“…Misuse case is one of the security requirement elicitation techniques that are easy to use and learn. …”
Article -
2
Learning new attack vectors from misuse cases with deep reinforcement learning
Published 2023-03-01Subjects: “…misuse case…”
Get full text
Article -
3
-
4
Maximizing Test Coverage for Security Threats Using Optimal Test Data Generation
Published 2023-07-01Subjects: Get full text
Article -
5
Analyzing security aspects during software design phase using attack-based analysis model
Published 2014“…In this work we address this problem by defining a method for using known attacks' and threats' properties and behaviors instead of using a drawn misuse case for assessing potential risks in the developing software. …”
Article -
6
A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases
Published 2016“…This paper discusses the generation of use case, misuse case and class diagrams based on security mechanism that need to be embedded in the e-Tendering model.This study also found that, the RUP is one of the best system development methodology that can be used as one of the research methodology in the Software Engineering domain, especially related to secured design of any observed application.This methodology has been tested in various studies, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth.This study may contribute to the software industries in developing a secured system application in the future, and also to the secured system modeling domain.…”
Get full text
Article -
7
Holistic Security and Safety for Factories of the Future
Published 2022-12-01“…The results of these misuse case simulations showed how the SMS-DT platform can intervene in two domains in the first scenario and three in the second one, resulting in correlating the alerts and reporting them to security operators in the multi-domain intelligent correlation dashboard.…”
Get full text
Article -
8
A Development of Hybrid Drug Information System Using Image Recognition
Published 2015-04-01“…In order to prevent drug abuse or misuse cases and avoid over-prescriptions, it is necessary for medicine taker to be provided with detailed information about the medicine. …”
Get full text
Article -
9
A Review Of Forensic Analysis Techniques For Android Phones
Published 2017-07-01“… Mobile forensics analysis is the sub-domain of digital forensics, which addresses solving the minor technology misuse cases to substantial international digital crime cases. …”
Get full text
Article -
10
Towards a Security Reference Architecture for NFV
Published 2022-05-01“…Representing threats as misuse cases that describe the modus operandi of attackers, we can find countermeasures to them in the form of security patterns, and we can build a security reference architecture (SRA). …”
Get full text
Article -
11
HSViz-II: Octet Layered Hierarchy Simplified Visualizations for Distributed Firewall Policy Analysis
Published 2024-01-01“…The proposed tool, HSViz-II, not only visualizes misuse of a single firewall policy but also visualizes four misuse cases in a distributed firewall environment, providing a detailed breakdown based on Octets. …”
Get full text
Article -
12
Investigating the Use of a Serious Game to Improve Opioid Safety Awareness Among Adolescents: Quantitative Study
Published 2021-12-01“…Serious games (SGs) are a novel way to promote the safe and responsible management of opioid medications among adolescents, thereby reducing the number of adolescent opioid misuse cases reported annually. ObjectiveThis study aimed to examine the effect of the SG MedSMART: Adventures in PharmaCity on adolescents’ opioid safety knowledge, awareness, behavioral intent, and self-efficacy. …”
Get full text
Article