Yahoo Web Search

Search results

  1. Sep 1, 2023 · This article presents a systematic literature review and a detailed analysis of AI use cases for cybersecurity provisioning. The review resulted in 2395 studies, of which 236 were identified as primary.

  2. Aug 1, 2022 · Systematic literature review of security assurance of the ICT and CPSs. •. Study the challenges and gaps of existing assurance challenges and solutions. •. Discussed the limitations of the present methods and future research directions. •. Review of assurance requirements, processes, and activities. •.

  3. Sep 29, 2023 · The articles mainly focused on four main research areas: (1) usability of authentication methods, (2) helping security developers improve usability, (3) design strategies for influencing user security behavior, and (4) formal models for usable security evaluation.

  4. A research review is explicit about the research questions, search strategy, inclusion and exclusion criteria, data extraction method and steps taken for analysis. Research reviews are, unlike subjective reviews, comprehensible and easily reproducible ( Fink, 2019 ).

  5. Jun 23, 2022 · Matthew Manning, Gabriel T. W. Wong & Hien-Thuc Pham. 1389 Accesses. Abstract. The varying quality and immense volume of research relating to security highlights a challenge for policymakers and practitioners who want to improve decision-making by drawing on the empirical evidence.

  6. Jan 5, 2022 · The major purpose of this paper is to learn about software security risks and practices so that secure software development methods can be better designed. A systematic literature review (SLR) was performed to classify important studies to achieve this goal.

  7. People also ask

  8. Mar 27, 2023 · With gaps in the security systems, attackers have attempted to intrude the network, thereby gaining access to essential and confidential information, which may cause harm to the operation of the systems, and also affect the confidentiality of the data.

  1. People also search for