[PDF][PDF] A review on factors influencing implementation of secure software development practices

SL Kanniah, MN Mahrin - International Journal of Computer and …, 2016 - academia.edu
More and more businesses and services are depending on software to run their daily
operations and business services. At the same time, cyber-attacNs are becoming more …

A maturity model for secure requirements engineering

M Niazi, AM Saeed, M Alshayeb, S Mahmood… - Computers & …, 2020 - Elsevier
Security is considered to be a critical software quality attribute. Tackling security at the
requirements phase helps to avoid the need to rework secure software development issues …

[PDF][PDF] Analysis and Study of Vulnerability Scanning Result for Projects within Organization

NI Daud, KAA Bakar - uruae.urst.org
This paper attempts to share about analysis and study of vulnerability scanning result for
projects in our organization. For the case study, we collected vulnerability scanning result …

Filtering security controls

DV Dhillon, GW Lazar - US Patent 11,442,701, 2022 - Google Patents
Methods, apparatus, and processor-readable storage media for filtering security controls are
provided herein. An example computer-implemented method includes obtaining information …

Executing security scanning in secure software process implementation within organization

NI Daud, SC Seak, GR Haron - Presented at International …, 2011 - actapress.com
This paper attempts to share about an approach on executing security scanning in the
secure software process life cycle within organization. It will describe about an overview of …

A Model for Incorporating Security Practices Into Requirement Phase

AMM Saeed - 2018 - search.proquest.com
Security is considered a critical aspect of software development. Many software programs
have different processes or issues with respect to security due to the growth of internet …