REFERENCES
Gemalto 2023: State of iot security. Network Security,
2019(2):4–4.
Adel, A. (2022). Future of industry 5.0 in society: Human-
centric solutions, challenges and prospective research
areas. J. of Cloud Computing, 11(1):1–15.
Andrade (20 December 2022). Azure identity & ac-
cess security best practices microsoft learn. in
azure security fundamentals documentations.
https://learn.microsoft.com, Retrieved(July 14,2023).
Andrade, R. O., Yoo, S. G., Tello-Oquendo, L., and Ortiz-
Garc
´
es, I. (2020). A comprehensive study of the iot
cybersecurity in smart cities. IEEE Access, 8:19.
Athanasopoulos, E. and et al. (December 2022). Cy-
bersecurity for europe. In Markatos, E. and Ran-
nenberg, K., editors, Blue book, pages 70–91.
https://cybersec4europe.eu.
Atlassian, J. (7 May 2023). Jira security issues. atlas-
sian community. https://community.atlassian.com/,
Retrieved(July 14,2023).
Bonorchis (20 October 2022). Jira-issue & project tracking
software. atlassian. https://www.atlassian.com, Re-
trieved(July 14,2023).
Bravos, G., Cabrera, A. J., Correa, C., Danilovi
´
c, Vasiliadis,
G., and Vukobratovic, D. (2022). Cybersecurity for
industrial internet of things: Architecture, models and
lessons learned. IEEE Access, 10:124747–124765.
Casola, V., De Benedictis, A., and Rak (2020). A novel
security-by-design methodology: Modeling and as-
sessing security by slas with a quantitative approach.
J. of Systems and Software, 163:110537.
Chhetri, M. B., Liu, X., Grobler, M., Hoang, T., Renaud,
K., and McIntosh, J. (2022). Report on the 2nd work-
shop on human centric software engineering & cyber
security (hcse&cs 2021). SIGSOFT Softw. Eng. Notes,
47(2):12–14.
Chiara, P. G. (2022). The iot and the new eu cybersecurity
regulatory landscape. Int.Review of Law, Computers
& Technology, 36(2):118–137.
Daoudagh, S. and Marchetti, E. (2023). Breakthroughs in
testing and certification in cybersecurity: Research
gaps and open problems. In Proc. of the 7th Italian
Conference on Cyber Security, Bari, Italy, February
2nd to 5th, 2023, CEUR Workshop Proceedings.
European, U. (15 December 2022). European digital-
ization vision. https://www.europarl.europa.eu, Re-
trieved(July 14,2023).
Garousi, V., Rainer, A., Lauv
˚
as Jr, P., and Arcuri, A. (2020).
Software-testing education: A systematic literature
mapping. J. of Systems and Software, 165:110570.
G
´
omez, G., Espina, E., and Armas-Aguirre, J. M. M.
(2021). Cybersecurity architecture functional model
for cyber risk reduction in iot based wearable devices.
In 2021 Congreso Internacional de Innovaci
´
on y Ten-
dencias en Ingenier
´
ıa, pages 1–4. IEEE.
Heiding, F., S
¨
uren, E., Oleg
˚
ard, J., and Lagerstr
¨
om, R.
(2023). Penetration testing of connected households.
Computers & Security, 126:103067.
Infastructure, A. S. (22 November 2022). Ama-
zon cloud security – amazon web services (aws).
https://aws.amazon.com, Retrieved(July 14,2023).
Jaber, A. and Fritsch, L. (2022). Towards ai-powered cyber-
security attack modeling with simulation tools: Re-
view of attack simulators. In Int. Conf. on P2P, Paral-
lel, Grid, Cloud and Internet Computing, pages 249–
257. Springer.
Kirk, R., Nguyen, H. N., Bryans, J., and Shaikh (2023). A
formal framework for security testing of automotive
over-the-air update systems. J.of Logical and Alge-
braic Methods in Programming, 130:100812.
Pawlicka, A., Pawlicki, M., Kozik, R., and Chora
´
s, M.
(2022). Human-driven and human-centred cybersecu-
rity: policy-making implications. Transforming Gov-
ernment: People, Process and Policy, 16(4):478–487.
Pearlson, K. and Huang, K. (2022). Design for cybersecu-
rity from the start. MIT Sloan Management Review,
63(2):73–77.
Rajabion, L. (2023). Industry 5.0 and cyber crime security
threats. In Advanced Research and Real-World Appli-
cations of Industry 5.0, pages 66–76. IGI Global.
Security, G. C. (2 August 2020). Google cloud blogs.
google cloud solutions. https://cloud.google.com, Re-
trieved(July 14,2023).
Srujana, S., Sreeja, P., Swetha, G., and Shanmugasundaram,
H. (2022). Cutting edge technologies for improved
cybersecurity model: A survey. In 2022 International
Conference on Applied AI and Computing (ICAAIC).
Straub, J. (2020). Software engineering: The first line of
defense for cybersecurity. In 2020 IEEE 11th Int.
Conf. on Software Engineering and Service Science
(ICSESS), pages 1–5. IEEE.
Tahaei, M. and Vaniea (2023). Embedding privacy into de-
sign through software developers: Challenges and so-
lutions. IEEE Security & Privacy, 21(1):49–57.
Trustmark, I. S. (2 December 2021). Baseline iot cyberse-
curity requirements. https://trustmark.tech/baseline/,
Retrieved(July 14,2023).
Varma, A. J., Taleb, N., Said, R. A., Ghazal, T. M., Ahmad,
M., Alzoubi, H. M., and Alshurideh, M. (2023). A
roadmap for smes to adopt an ai based cyber threat in-
telligence. In The Effect of IT on Business and Market-
ing Intelligence Systems, pages 1903–1926. Springer.
WhiteHouse, N. C. (12 May 2021). Executive
order on improving the nation’s cybersecurity.
https://www.whitehouse.gov, Retrieved(July 14 2023).
Zaghloul, Z. S., Elsayed, N., Li, C., and Bayoumi, M.
(2021). Green iot system architecture for applied au-
tonomous network cybersecurity monitoring. In 2021
IEEE 7th World Forum on IoT (WF-IoT), pages 628–
632. IEEE.
The Impact of IOT Cybersecurity Testing in the Perspective of Industry 5.0
487