2022
DOI: 10.1109/access.2021.3136861
|View full text |Cite
|
Sign up to set email alerts
|

Agile Approaches for Cybersecurity Systems, IoT and Intelligent Transportation

Abstract: To adapt to the rapidly increasing vulnerabilities in software products and cyber threats that exploit them, security professionals are actively working with software developers to produce more secure systems. In software development, agile methods are increasingly adopted in critical software projects where security risks are prominent challenges. This adoption stems from the fact that agile methods are highly iterative and support delivering services and products in smaller batches which allows security prof… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(6 citation statements)
references
References 70 publications
0
6
0
Order By: Relevance
“…Consequently, LSTMs have become a cornerstone in deep learning (DL) for effectively categorizing and processing sequential and time-series data, overcoming the limitations associated with discharging and disappearing gradients that plagued earlier RNN models [29]. Tashtouth et al [38] and Al-Eidi et al [39] discussed implementing cybersecurity systems and highlighted the dual nature of technological advancements in cybersecurity, offering insights into both the challenges and opportunities presented by novel attack vectors and defensive mechanisms.…”
Section: Nlp Models: Rnn and Lstmmentioning
confidence: 99%
“…Consequently, LSTMs have become a cornerstone in deep learning (DL) for effectively categorizing and processing sequential and time-series data, overcoming the limitations associated with discharging and disappearing gradients that plagued earlier RNN models [29]. Tashtouth et al [38] and Al-Eidi et al [39] discussed implementing cybersecurity systems and highlighted the dual nature of technological advancements in cybersecurity, offering insights into both the challenges and opportunities presented by novel attack vectors and defensive mechanisms.…”
Section: Nlp Models: Rnn and Lstmmentioning
confidence: 99%
“…• The Application Layer provides global management of the application based on information processed in the Middleware layer. The example of applications layer such as smart health [73], smart farming [74], smart home [75], smart city [76], intelligent transportation [77], and many others.…”
Section: B Iot Wsn System Generic Architecturementioning
confidence: 99%
“…When it comes to the execution of the cybersecurity solution-building activities, it seems that the agile approach should be adopted (Tashtoush et al , 2022). In the context of technology, this means that the final outcomes of the tools and methods depend on close cooperation and communication with end-users.…”
Section: The “New” Human-related Aspects Of Cybersecuritymentioning
confidence: 99%