Systematic mapping study on security approaches in secure software engineering
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …
integral component of human society. Such wide use of software systems consists of large …
Systematic literature review on security risks and its practices in secure software development
Security is one of the most critical aspects of software quality. Software security refers to the
process of creating and developing software that assures the integrity, confidentiality, and …
process of creating and developing software that assures the integrity, confidentiality, and …
Security assurance model of software development for global software development vendors
The number of security attacks and the impact has grown considerably in the recent several
years. As a result, new emerging software development models are required that assist in …
years. As a result, new emerging software development models are required that assist in …
Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach
A Alzahrani, RA Khan - Computers in Human Behavior, 2024 - Elsevier
Ubiquitous computing systems are deployed everywhere to process and service complex
applications in real time. It has been noticed that most ubiquitous computing practitioners …
applications in real time. It has been noticed that most ubiquitous computing practitioners …
Security risks of global software development life cycle: Industry practitioner's perspective
Software security has become increasingly important because the malicious attack and
other hacker risks of a computer system have grown popularity in the last few years. As a …
other hacker risks of a computer system have grown popularity in the last few years. As a …
Towards the integration of security practices in agile software development: a systematic mapping review
Y Valdés-Rodríguez, J Hochstetter-Diez… - Applied Sciences, 2023 - mdpi.com
Software development must be based on more than just the experience and capabilities of
your programmers and your team. The importance of obtaining a quality product lies in the …
your programmers and your team. The importance of obtaining a quality product lies in the …
Intellectual structure of cybersecurity research in enterprise information systems
N Singh, V Krishnaswamy, JZ Zhang - Enterprise Information …, 2023 - Taylor & Francis
Enterprises aspire for ongoing and effective information systems security. Cybersecurity
frameworks ensure the availability, confidentiality, and integrity of information. Inspired by …
frameworks ensure the availability, confidentiality, and integrity of information. Inspired by …
An empirical study for mitigating sustainable cloud computing challenges using ISM-ANN
The significance of cloud computing methods in everyday life is growing as a result of the
exponential advancement and refinement of artificial technology. As cloud computing makes …
exponential advancement and refinement of artificial technology. As cloud computing makes …
Assessing of Software Security Reliability: Dimensional Security Assurance Techniques
Security plays a crucial role in ensuring the reliability of software systems, making a secure
and dependable security framework vital for safeguarding software integrity. However …
and dependable security framework vital for safeguarding software integrity. However …
Secure Software Development: Issues and Challenges
SW Ping, JCJ Wah, LW Jie, JBY Han… - arXiv preprint arXiv …, 2023 - arxiv.org
In recent years, technology has advanced considerably with the introduction of many
systems including advanced robotics, big data analytics, cloud computing, machine learning …
systems including advanced robotics, big data analytics, cloud computing, machine learning …