Cybersecurity threat and risk analysis (RA) approaches are used to identify and mitigate security risks early-on in the software development life-cycle. Existing approaches automate only parts of the analysis procedure, leaving key decisions in identification, feasibility and risk analysis, and quality assessment to be determined by expert judgement. Therefore, in practice teams of experts manually analyze the system design by holding brainstorming workshops. Such decisions are made in face of uncertainties, leaving room for biased judgement (e.g., preferential treatment of category of experts). Biased decision making during the analysis may result in unequal contribution of expertise, particularly since some diversity dimensions (i.e., gen...
Although many have recognized that software monocultures are a major impediment to improving securit...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
This electronic version was submitted by the student author. The certified thesis is available in th...
Cybersecurity threat and risk analysis (RA) approaches are used to identify and mitigate security ri...
Cybersecurity threat and risk analysis (RA) approaches are used to identify and mitigate security ri...
Software security is increasing in importance, linearly with vulnerabilities caused by software flaw...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Early experiments with software diversity in the mid 1970's investigated N-version programming and r...
One of the challenges of secure software construction (and maintenance) is to get control over the m...
Diversity is an important and valuable concept that has been adopted in many fields to reduce correl...
Background: Organizations are experiencing an increasing demand for security-by-design activities (e...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
The information security (IS) risk assessment process is an essential part to organisation's their p...
The purpose of this study is to review the existing cybersecurity assessments and practices used by ...
Although many have recognized that software monocultures are a major impediment to improving securit...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
This electronic version was submitted by the student author. The certified thesis is available in th...
Cybersecurity threat and risk analysis (RA) approaches are used to identify and mitigate security ri...
Cybersecurity threat and risk analysis (RA) approaches are used to identify and mitigate security ri...
Software security is increasing in importance, linearly with vulnerabilities caused by software flaw...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Early experiments with software diversity in the mid 1970's investigated N-version programming and r...
One of the challenges of secure software construction (and maintenance) is to get control over the m...
Diversity is an important and valuable concept that has been adopted in many fields to reduce correl...
Background: Organizations are experiencing an increasing demand for security-by-design activities (e...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
The information security (IS) risk assessment process is an essential part to organisation's their p...
The purpose of this study is to review the existing cybersecurity assessments and practices used by ...
Although many have recognized that software monocultures are a major impediment to improving securit...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
This electronic version was submitted by the student author. The certified thesis is available in th...