editors, Security, Privacy, and Applied Cryptography
Engineering, pages 123–141, Cham. Springer Interna-
tional Publishing.
Chopra, I. and Singh, M. (2011). Sasm-an approach to-
wards self-protection in grid computing. In Dua, S.,
Sahni, S., and Goyal, D. P., editors, Information Intel-
ligence, Systems, Technology and Management, Com-
munications in Computer and Information Science,
pages 149–159. Springer Berlin Heidelberg.
Dey, S., Sampalli, S., and Ye, Q. (2015). A context-adaptive
security framework for mobile cloud computing. In
11th International Conference on Mobile Ad-hoc and
Sensor Networks, pages 89–95.
Foundation, O. (2021). Owasp mobile security project.
[On-line]. Available: http://tiny.cc/owasp-top10-msp,
Accessed on February 26, 2021,.
Gamma, E., Helm, R., Johnson, R., and Vlissides, J.
(1995). Design Patterns: Elements of Reusable
Object-oriented Software. Addison-Wesley Longman
Publishing Co., Inc., Boston, MA, USA.
IBM (2005). An architectural blueprint for autonomic com-
puting. [On-line]. Available: http://tiny.cc/ibm-loop,
Third Edition, Accessed on February 21, 2021.
Kamath, U. and Choppella, K. (2017). Mastering Java
Machine Learning: A Java Developer’s Guide to Im-
plementing Machine Learning and Big Data Architec-
tures. Packt Publishing.
Lara, E., Aguilar, L., Sanchez, M. A., and Garc
´
ıa, J. A.
(2019). Adaptive security based on mape-k: A survey.
In Sanchez, M. A., Aguilar, L., Casta
˜
n
´
on-Puga, M.,
and Rodr
´
ıguez, A., editors, Applied Decision-Making:
Applications in Computer Sciences and Engineering,
pages 157–183, Cham. Springer International Pub-
lishing.
Martin, B., Brown, M., Paller, A., and Kirby, D. (2021).
2011 cwe/sans top 25 most dangerous software er-
rors. [On-line]. Available: https://cwe.mitre.org/
top25/index.html, Accessed on February 26, 2021,.
Martins, R. R., de Oliveira Camargo, M. P., Passini,
W. F., Campos, G. N., and Affonso, F. J. (2021).
Mapping study on self-protecting property for
service-based mobile applications domain. [On-
line]. Available: https://drive.google.com/file/d/
1yxQ58VrJ06Ks5T3h7aXk9dAi7bm3wUqO/view,
Accessed on February 26, 2021.
Mowafi, Y., Abou-Tair, D., Aqarbeh, T., Abilov, M.,
Dmitriyev, V., and Gomez, J. M. (2014). A context-
aware adaptive security framework for mobile ap-
plications. In Proceedings of the 3rd International
Conference on Context-Aware Systems and Applica-
tions, ICCASA ’14, pages 147–153, Brussels, Bel-
gium. ICST (Institute for Computer Sciences, Social-
Informatics and Telecommunications Engineering).
OWASP (2021a). The owasp foundation. [On-line]. Avail-
able: https://www.owasp.org, Accessed on February
26, 2021,.
OWASP (2021b). Owasp proactive controls.
[On-line]. Available: https://owasp.org/
www-project-proactive-controls, Accessed on
February 26, 2021,.
OWASP (2021c). Owasp risk rating methodology. [On-
line]. Available: https://www.owasp.org/index.php/
OWASP Risk Rating Methodology, Accessed on
February 26, 2021,.
Petersen, K., Vakkalanka, S., and Kuzniarz, L. (2015).
Guidelines for conducting systematic mapping stud-
ies in software engineering: An update. Information
and Software Technology, 64:1 – 18.
Psaier, H. and Dustdar, S. (2011). A survey on self-
healing systems: approaches and systems. Comput-
ing, 91(1):43–73.
Salehie, M. and Tahvildari, L. (2009). Self-adaptive soft-
ware: Landscape and research challenges. ACM
Transactions on Autonomous and Adaptive Systems,
4:1–42.
Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H.,
Watters, P., and Ng, A. (2020). Cybersecurity data
science: an overview from machine learning perspec-
tive. Journal of Big Data, 7(1):41.
Saxena, A., Lacoste, M., Jarboui, T., L
¨
ucking, U., and
Steinke, B. (2007). A software framework for au-
tonomic security in pervasive environments. In Mc-
Daniel, P. and Gupta, S. K., editors, Information
Systems Security, pages 91–109, Berlin, Heidelberg.
Springer Berlin Heidelberg.
Torrano, C., P
´
erez, A., and
´
Alvarez, G. (2012). Http csic
torpeda 2012 dataset. [On-line]. Available: https://
www.tic.itefi.csic.es/torpeda/datasets.html, Accessed
on February 26, 2021.
Tziakouris, G., Bahsoon, R., and Babar, M. A. (2018).
A survey on self-adaptive security for large-scale
open environments. ACM Computing Surveys,
51(5):100:1–100:42.
Watson, C., Groves, D., and Melton, J. (2015). Appsensor
guide - application-specific real time attack detection
& response. version 2.0. [On-line]. Published 27th
July 2015. Available: http://tiny.cc/owasp-appsensor,
Accessed on February 26, 2021,.
Yuan, E., Esfahani, N., and Malek, S. (2014). A system-
atic survey of self-protecting software systems. ACM
Transactions on Autonomous and Adaptive Systems,
8(4).
Yuan, E. and Malek, S. (2012). A taxonomy and survey
of self-protecting software systems. In ICSE Work-
shop on Software Engineering for Adaptive and Self-
Managing Systems, pages 109–118.
Zahrani, M. (2016). Self-protection and security in mobile
cloud computing. Research Journal of Information
Technology, 8(1-2):47–54.
ICEIS 2021 - 23rd International Conference on Enterprise Information Systems
320