Systematic mapping study on security approaches in secure software engineering

RA Khan, SU Khan, HU Khan, M Ilyas - Ieee Access, 2021 - ieeexplore.ieee.org
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …

Systematic literature review on security risks and its practices in secure software development

RA Khan, SU Khan, HU Khan, M Ilyas - ieee Access, 2022 - ieeexplore.ieee.org
Security is one of the most critical aspects of software quality. Software security refers to the
process of creating and developing software that assures the integrity, confidentiality, and …

Security assurance model of software development for global software development vendors

RA Khan, SU Khan, M Alzahrani, M Ilyas - Ieee Access, 2022 - ieeexplore.ieee.org
The number of security attacks and the impact has grown considerably in the recent several
years. As a result, new emerging software development models are required that assist in …

Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach

A Alzahrani, RA Khan - Computers in Human Behavior, 2024 - Elsevier
Ubiquitous computing systems are deployed everywhere to process and service complex
applications in real time. It has been noticed that most ubiquitous computing practitioners …

Security risks of global software development life cycle: Industry practitioner's perspective

RA Khan, SU Khan, MA Akbar… - Journal of Software …, 2024 - Wiley Online Library
Software security has become increasingly important because the malicious attack and
other hacker risks of a computer system have grown popularity in the last few years. As a …

Towards the integration of security practices in agile software development: a systematic mapping review

Y Valdés-Rodríguez, J Hochstetter-Diez… - Applied Sciences, 2023 - mdpi.com
Software development must be based on more than just the experience and capabilities of
your programmers and your team. The importance of obtaining a quality product lies in the …

Intellectual structure of cybersecurity research in enterprise information systems

N Singh, V Krishnaswamy, JZ Zhang - Enterprise Information …, 2023 - Taylor & Francis
Enterprises aspire for ongoing and effective information systems security. Cybersecurity
frameworks ensure the availability, confidentiality, and integrity of information. Inspired by …

An empirical study for mitigating sustainable cloud computing challenges using ISM-ANN

HS Alwageed, I Keshta, RA Khan, A Alzahrani… - PloS one, 2024 - journals.plos.org
The significance of cloud computing methods in everyday life is growing as a result of the
exponential advancement and refinement of artificial technology. As cloud computing makes …

Assessing of Software Security Reliability: Dimensional Security Assurance Techniques

M Ali, A Ullah, MR Islam, R Hossain - Computers & Security, 2024 - Elsevier
Security plays a crucial role in ensuring the reliability of software systems, making a secure
and dependable security framework vital for safeguarding software integrity. However …

Secure Software Development: Issues and Challenges

SW Ping, JCJ Wah, LW Jie, JBY Han… - arXiv preprint arXiv …, 2023 - arxiv.org
In recent years, technology has advanced considerably with the introduction of many
systems including advanced robotics, big data analytics, cloud computing, machine learning …