An analysis of cloud computing security issues, 2012 World Congress on Information and Communication Technologies, pp.109-114, 2012. ,
Research design : qualitative, quantitative, and mixed methods approaches ,
Security Challenges in IoT Development: A Software Engineering Perspective, Proceedings of the XP2017 Scientific Workshops. pp. 11:1-11:5. XP '17, 2017. ,
Chapter One -Security Testing: A Survey, Advances in Computers, vol.101, pp.1-51, 2016. ,
,
Handheld hazards: The rise of malware on mobile devices, Computer Fraud & Security, issue.5, pp.70210-70214, 2005. ,
Beyond the hype: Big data concepts, methods, and analytics, vol.35, pp.137-144 ,
Options for formulating a digital transformation strategy 15/2, pp.123-139 ,
, InfoQ: Guide to digital transformation. define, price, and plan a digital transformation
, ISACA: State of Cybersecurity: Implications for 2016 -An ISACA and RSA Conference Survey, 2016.
, Strategy, not technology, drives digital transformation, 2015.
EDA for secure and dependable cybercars: Challenges and opportunities, DAC Design Automation Conference, pp.220-228, 2012. ,
3d data management: Controlling data volume, velocity, and variety | BibSonomy ,
, Digital Literacies: concepts, policies and practices, vol.30
MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud, IEEE Transactions on Computers, vol.64, issue.9, pp.2609-2622, 2015. ,
Risk management for digital transformation in architecture board: A case study on global enterprise, 2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI), pp.255-262 ,
, Digital transformation strategies, vol.57, pp.339-343
Software Security Testing, IEEE Security and Privacy, vol.2, issue.5, pp.81-85, 2004. ,
Android vs iOS security: A comparative study, 12th International Conference on Information Technology -New Generations, pp.725-730, 2015. ,
Artificial Intelligence and the Future of Cybersecurity, Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, pp.93-98, 2011. ,
Software testing of mobile applications: Challenges and future research directions, 2012 7th International Workshop on Automation of Software Test (AST), pp.29-35, 2012. ,
,
, Minimum viable products for internet of things applications: Common pitfalls and practices, vol.11, p.50
When Mobile is Harder Than Fixed (and Vice Versa): Demystifying Security Challenges in Mobile Environments, Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications. pp. 43-48. HotMobile '10, 2010. ,
,
Security Issues in NoSQL Databases, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp.541-547, 2011. ,
A guide to conducting a standalone systematic literature review, vol.37 ,
URL : https://hal.archives-ouvertes.fr/hal-01574600
Mobile malware security challeges and cloud-based detection, 2014 International Conference on Collaboration Technologies and Systems (CTS). pp, pp.181-188, 2014. ,
AuDroid: Preventing attacks on audio channels in mobile devices, Proceedings of the 31st Annual Computer Security Applications Conference, pp.181-190, 2015. ,
A Survey on Security for Mobile Devices, IEEE Communications Surveys Tutorials, vol.15, issue.1, pp.446-471, 2013. ,
, Ponemon: Cost of a Data Breach Study: Global overview, Tech. rep., IBM, 2018.
Security Challenges for the Public Cloud, IEEE Internet Computing, vol.16, issue.1, pp.69-73, 2012. ,
, A Primer on Hardware Security: Models, Methods, and Metrics. Proceedings of the IEEE, vol.102, pp.1283-1295, 2014.
Security and privacy challenges in industrial Internet of Things, 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp.1-6, 2015. ,
Big data: A review, 2013 International Conference on Collaboration Technologies and Systems (CTS), pp.42-47 ,
FIPS Pub 199: Standards for Security Categorization of Federal Information and Information Systems, 2004. ,
Software engineering data collection for field studies, Guide to Advanced Empirical Software Engineering, pp.9-34 ,
The Research of Security Technology in the Internet of Things, Advances in Computer Science, Intelligent System and Environment, pp.113-119, 2011. ,
National cyber security strategies for digital economy, 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), pp.1-6 ,
A survey on security and privacy issues in big data, 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp.202-207, 2015. ,
Embracing digital technology ,
Cloud Storage as the Infrastructure of Cloud Computing, 2010 International Conference on Intelligent Computing and Cognitive Informatics, pp.380-383, 2010. ,
,