CW Axelrod - IEEE Long Island Systems, Applications and …, 2014 - ieeexplore.ieee.org
According to the Office of the Assistant Secretary of Defense for Research and Engineering (ASD (R&E)), the US Department of Defense (DoD) recognizes that there is a “persistent …
Though some software development teams are highly effective at delivering security, others either do not care or do not have access to security experts to teach them how …
Many have long regarded software assessment as a way to determine the correctness of software. Formal methods attempt to build in correct behavior. Techniques such as formal …
M Zarour, M Alenezi, K Alsarayrah - Proceedings of the 24th International …, 2020 - dl.acm.org
Huge numbers of worldwide-deployed software suffer from poor quality and possess vulnerabilities with serious impact. Meanwhile, people are using such software to save and …
M Ruggieri, TT Hsu, ML Ali - 2019 IEEE 10th Annual Ubiquitous …, 2019 - ieeexplore.ieee.org
Security is an important factor when it comes to the development of software systems. In each of the developing steps of the software system we have to think of what security …
KR Van Wyk, G McGraw - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
Traditionally, software development efforts in large corporations have been about as far removed from information security as they were from human resources or any other …
The number of security attacks and the impact has grown considerably in the recent several years. As a result, new emerging software development models are required that assist in …
Modern society is deeply and irreversibly dependent on software systems of remarkable scope and complexity in areas including defense, government, energy, communication …
F Moyón, C Bayr, D Mendez, S Dännart… - … conference on current …, 2020 - Springer
Companies are often challenged to modify and improve their software development processes in order to make them compliant with security standards. The complexity of these …