Preliminary systematic literature review on the adoption of Security as a Service (SECaaS)
Security as a Service (SECaaS) involves delivering security applications and services via the cloud computing technology to consumers, known as subscribers. Inspired by software as a Service (SaaS), the SECaaS approach promises to provide a high level of security and resources saving. Recent studies...
| Main Authors: | Tanko, Mohammed Yahaya, Md Sultan, Abu Bakar, Zulzalil, Hazura, Osman, Mohd Hafeez |
|---|---|
| Format: | Article |
| Published: |
European Chemical Journal
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/109369/ |
Similar Items
A systematic literature review on characteristics influencing
software reliability
by: Hassan, Sa'adah, et al.
Published: (2024)
by: Hassan, Sa'adah, et al.
Published: (2024)
Systematic literature review : the important factors in assessing the trustworthiness of OSS.
by: Md. Sultan, Abu Bakar, et al.
Published: (2013)
by: Md. Sultan, Abu Bakar, et al.
Published: (2013)
An approach for vulnerability detection in web applications using graph neural networks and transformers
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Requirements prioritization techniques focusing on agile software development: a systematic literature review
by: Borhan, Noor Hazlini, et al.
Published: (2019)
by: Borhan, Noor Hazlini, et al.
Published: (2019)
Citizen adoption of E-government services: a systematic literature review with weight and meta-analysis
by: Ahmed Saleh, Rakib, et al.
Published: (2024)
by: Ahmed Saleh, Rakib, et al.
Published: (2024)
A systematic literature review of mitigating cyber security risk
by: Kamarudin, Syafila, et al.
Published: (2023)
by: Kamarudin, Syafila, et al.
Published: (2023)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
Sustainable Adoption And Implementation In Collaborative Enterprise: A Systematic Literature Review
by: Jnr, Bokolo Anthony, et al.
Published: (2017)
by: Jnr, Bokolo Anthony, et al.
Published: (2017)
Enterprise resource planning adoption lifecycle: a systematic literature review
by: Hassan, Marina, et al.
Published: (2016)
by: Hassan, Marina, et al.
Published: (2016)
Systematic literature review on search based software testing
by: Md Sultan, Abu Bakar, et al.
Published: (2013)
by: Md Sultan, Abu Bakar, et al.
Published: (2013)
Empirical studies on the impact of software customization on quality attributes: a systematic review
by: Ali, Abdulrazzaq Qasem, et al.
Published: (2019)
by: Ali, Abdulrazzaq Qasem, et al.
Published: (2019)
Evolution of information security awareness towards maturity: a systematic review
by: Ahmad, Mohd Ridzam, et al.
Published: (2024)
by: Ahmad, Mohd Ridzam, et al.
Published: (2024)
Information and communication technology (ICT) adoption and community: a systematic literature review
by: Rohani Hasbie, Siti Nur, et al.
Published: (2023)
by: Rohani Hasbie, Siti Nur, et al.
Published: (2023)
Antecedents of cloud computing adoption in the Malaysian context: a systematic literature review
by: Teh, Raymond, et al.
Published: (2021)
by: Teh, Raymond, et al.
Published: (2021)
Factors influencing the adoption of bundled sustainable agricultural practices: a systematic literature review
by: Rajendran, Natasha, et al.
Published: (2016)
by: Rajendran, Natasha, et al.
Published: (2016)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Recent advances in mobile touch screen security authentication methods: a systematic literature review
by: Ibrahim, Tahir Musa, et al.
Published: (2019)
by: Ibrahim, Tahir Musa, et al.
Published: (2019)
Adopting genetic algorithm to enhance state-sensitivity partitioning
by: Sultan, Ammar Mohammed, et al.
Published: (2015)
by: Sultan, Ammar Mohammed, et al.
Published: (2015)
Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: comprehensive taxonomy, open issues and challenges and recommended solution
by: Qahtan, Sarah, et al.
Published: (2023)
by: Qahtan, Sarah, et al.
Published: (2023)
A systematic literature review on waqf governance
by: Nursyahida Zulkifli,, et al.
Published: (2022)
by: Nursyahida Zulkifli,, et al.
Published: (2022)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
A decision cloud ranking approach based on privacy and security in blockchain E-Health Industry 4.0 systems
by: Qahtan, Sarah, et al.
Published: (2023)
by: Qahtan, Sarah, et al.
Published: (2023)
School counseling services for gifted and talented students: a systematic review of literature
by: Lee, Zhi Jie, et al.
Published: (2019)
by: Lee, Zhi Jie, et al.
Published: (2019)
A systematic literature review of cloud computing adoption and impacts among Small Medium Enterprises (SMEs)
by: Salleh, Noor Afzan, et al.
Published: (2018)
by: Salleh, Noor Afzan, et al.
Published: (2018)
Factors influencing user adoption on online sports training services: a systematic review
by: Wan Abas, Wan Anita, et al.
Published: (2024)
by: Wan Abas, Wan Anita, et al.
Published: (2024)
Review on software metrics thresholds for object-oriented software
by: Bakar, Abubakar Diwani, et al.
Published: (2013)
by: Bakar, Abubakar Diwani, et al.
Published: (2013)
Cloud computing adoption in Small and Medium Enterprises (SMEs): A systematic literature review and directions for future research
by: Jayeola, Olakunle, et al.
Published: (2021)
by: Jayeola, Olakunle, et al.
Published: (2021)
Sentiment analysis for Malay language: systematic literature review
by: Handayani, Dini, et al.
Published: (2018)
by: Handayani, Dini, et al.
Published: (2018)
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
by: Nuh, Jamal Abdullahi, et al.
Published: (2021)
by: Nuh, Jamal Abdullahi, et al.
Published: (2021)
How human aspects impress Agile software development transition and adoption
by: Gandomani, Taghi Javdani, et al.
Published: (2014)
by: Gandomani, Taghi Javdani, et al.
Published: (2014)
A systematic literature review and analysis of visual pollution
by: Gao, Hangyu, et al.
Published: (2024)
by: Gao, Hangyu, et al.
Published: (2024)
Analysis of literature review on factors influencing the adoption of telecommuting
by: Ismail, Farah Diyanah, et al.
Published: (2012)
by: Ismail, Farah Diyanah, et al.
Published: (2012)
Exploring facilitators of transition and adoption to agile methods: a grounded theory study
by: Gandomani, Taghi Javdani, et al.
Published: (2014)
by: Gandomani, Taghi Javdani, et al.
Published: (2014)
Systematic Literature Review in Modern Slavery in Operations
by: Kostopoulou, Sofia
Published: (2016)
by: Kostopoulou, Sofia
Published: (2016)
A systematic literature review of an advisory system
by: Ain Nadhira, Mohd Taib, et al.
Published: (2024)
by: Ain Nadhira, Mohd Taib, et al.
Published: (2024)
A systematic literature review on the translator's voice
by: Guo, Xiaohui, et al.
Published: (2023)
by: Guo, Xiaohui, et al.
Published: (2023)
Stakeholder quantification and prioritisation research: A systematic literature review
by: Hujainah, Fadhl, et al.
Published: (2018)
by: Hujainah, Fadhl, et al.
Published: (2018)
Similar Items
-
A systematic literature review on characteristics influencing
software reliability
by: Hassan, Sa'adah, et al.
Published: (2024) -
Systematic literature review : the important factors in assessing the trustworthiness of OSS.
by: Md. Sultan, Abu Bakar, et al.
Published: (2013) -
An approach for vulnerability detection in web applications using graph neural networks and transformers
by: Md Sultan, Abu Bakar, et al.
Published: (2024) -
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015) -
Requirements prioritization techniques focusing on agile software development: a systematic literature review
by: Borhan, Noor Hazlini, et al.
Published: (2019)