People | Locations | Statistics |
---|---|---|
Naji, M. |
| |
Motta, Antonella |
| |
Aletan, Dirar |
| |
Mohamed, Tarek |
| |
Ertürk, Emre |
| |
Taccardi, Nicola |
| |
Kononenko, Denys |
| |
Petrov, R. H. | Madrid |
|
Alshaaer, Mazen | Brussels |
|
Bih, L. |
| |
Casati, R. |
| |
Muller, Hermance |
| |
Kočí, Jan | Prague |
|
Šuljagić, Marija |
| |
Kalteremidou, Kalliopi-Artemi | Brussels |
|
Azam, Siraj |
| |
Ospanova, Alyiya |
| |
Blanpain, Bart |
| |
Ali, M. A. |
| |
Popa, V. |
| |
Rančić, M. |
| |
Ollier, Nadège |
| |
Azevedo, Nuno Monteiro |
| |
Landes, Michael |
| |
Rignanese, Gian-Marco |
|
Shantha Lakshmi Revathy, J.
in Cooperation with on an Cooperation-Score of 37%
Topics
Publications (1/1 displayed)
Places of action
Organizations | Location | People |
---|
booksection
Best Practices
Abstract
Internet of things (IoT) describes an emerging trend where a large number of embedded devices (things) are connected to the internet to participate in automating activities that create compounded value for the end consumers as well as for the enterprises. One of the greatest concerns in IoT is security, and how software engineers address it will play a deeper role. As devices interact with each other, businesses need to be able to securely handle the data deluge. With focused approach, it is possible to minimize the vulnerabilities and risks exposed to the devices and networks. Adopting security-induced software development lifecycle (SDL) is one of the major steps in identifying and minimizing the zero-day vulnerabilities and hence to secure the IoT applications and devices. This chapter focuses best practices for adopting security into the software development process with the help of two approaches: cryptographic and machine learning techniques to integrate secure coding and security testing ingrained as part of software development lifecycle.