Systematic guidance on usability methods in user-centered software development

L Cayola, JA Macías - Information and Software Technology, 2018 - Elsevier
Context In order to ensure usability, it is necessary to schedule activities and methods to be
applied throughout different stages of the development process. There exists a substantial …

Maturity model for secure software testing

G Alam, S Mahmood, M Alshayeb… - Journal of Software …, 2024 - Wiley Online Library
Security is an essential attribute of high‐quality software. However, effectively incorporating
security practices into different phases of the software development life cycle (SDLC) …

A template for writing security requirements

M Kamalrudin, N Mustafa, S Sidek - … Engineering for Internet of Things: 4th …, 2018 - Springer
Quality security requirements contribute to the success of secure software development.
However, the process of eliciting and writing security requirements is tedious and complex, It …

Automated support to capture and validate security requirements for mobile apps

N Yusop, M Kamalrudin, S Sidek, J Grundy - … Toward Sustainable World …, 2016 - Springer
Mobile application usage has become widespread and significant as it allows interactions
between people and services anywhere and anytime. However, issues related to security …

Meeting real challenges in eliciting security attributes for mobile application development

N Yusop, M Kamalrudin, MM Yusof… - Journal of Internet …, 2016 - koreascience.kr
There has been a rapid growth in the development of mobile application resulting from its
wide usage for online transaction, data storage and exchange of information. However, an …

An Automated Security Concerns Recommender Based on Use Case Specification Ontology

I Williams, X Yuan, M Anwar, JT McDonald - Automated Software …, 2022 - Springer
Identifying security concerns is a security activity that can be integrated into the requirements
development phase. However, it has been shown that manually identifying concerns is a …

Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective

C Banerjee, A Banerjee… - International Journal of …, 2017 - content.iospress.com
Security is an aspect which contains varied classification and dimensions. One such
classification of security is software security and it's facet is metrics. Software security metrics …

Security frameworks for machine-to-machine devices and networks

M Demblewski - 2015 - search.proquest.com
Attacks against mobile systems have escalated over the past decade. There have been
increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new …

[PDF][PDF] Eliciting Security Requirements of IoT Applications using Essential Use Case

AA Ibrahim, M Kamalrudin - International Journal of Information, 2019 - researchgate.net
Requirement elicitation is important to ensure correct requirements are elicit for application
development. Wrong elicitation decision leads to a software failure. The most common …

A review paper: Security requirement patterns for a secure software development

S Yahya, M Kamalrudin, S Sidek… - … and Data Sciences …, 2019 - ieeexplore.ieee.org
Security requirements are the major reasons for secure software developments. Many
methods, model and approaches have been designed by many researchers to ensure a …