Exploring software security approaches in software development lifecycle: A systematic mapping study

NM Mohammed, M Niazi, M Alshayeb… - Computer Standards & …, 2017 - Elsevier
There is an increase use of security driven approaches to support software development
activities, such as requirements, design and implementation. The objective of this paper is to …

High performance connected digit recognition using hidden Markov models

LR Rabiner, JG Wilpon… - IEEE Transactions on …, 1989 - ieeexplore.ieee.org
The authors use an enhanced analysis feature set consisting of both instantaneous and
transitional spectral information and test the hidden-Markov-model (HMM)-based connected …

Detecting compiler warning defects via diversity-guided program mutation

Y Tang, H Jiang, Z Zhou, X Li, Z Ren… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Compiler diagnostic warnings help developers identify potential programming mistakes
during program compilation. However, these warnings could be erroneous due to the …

[PDF][PDF] Secure software development model: A guide for secure software life cycle

MI Daud - Proceedings of the international MultiConference of …, 2010 - iaeng.org
Extreme programming (XP) is a modern approach for iterative development of software in
which you never wait for the complete requirements and start development. Security is …

A phase-wise review of software security metrics

SA Ansar, Alka, RA Khan - … and Data Knowledge Engineering: Volume 2, 2018 - Springer
Integrating securit y at each phase of the software Development Life cycle (SDLC) has
become an urgent need. Moreover, security must not be overlooked at early phases of …

Towards more trustable log files for digital forensics by means of “trusted computing”

B Böck, D Huemer, AM Tjoa - 2010 24th IEEE International …, 2010 - ieeexplore.ieee.org
Trustable log data is essential in digital forensic investigations in order to allow reliable
reconstruction of events. Existing solutions do not provide adequate protection, exposing the …

Significance of security metrics in secure software development

ST Siddiqui - International Journal of Applied Information Systems, 2017 - ijais.org
With increasing advancement of technology in the past years rise various security issues
and problems. In this connected world, security is a paramount and challenging issue in …

Metodología para la Detección de Vulnerabilidades en Redes de Datos

DA Franco, JL Perea, P Puello - Información tecnológica, 2012 - SciELO Chile
El objetivo principal de este trabajo fue diseñar una metodología para la detección de
vulnerabilidades en redes de datos. Para esto se desarrollaron diferentes fases llamadas …

Research on software design level security vulnerabilities

S Rehman, K Mustafa - ACM SIGSOFT Software Engineering Notes, 2009 - dl.acm.org
One of the major problems in software security is the lack of knowledge about security
among software developers. Even if a developer has good knowledge about current …

Corridor navigation with a LiDAR/INS Kalman filter solution

W Travis, AT Simmons, DM Bevly - … Vehicles Symposium, 2005., 2005 - ieeexplore.ieee.org
Autonomous capability requires reliable and robust navigation solutions in multiple
environments. GPS has become an effective tool but is not suitable for all environments …