A systematic map** study on security in agile requirements engineering
[Background] The rapidly changing business environments in which many companies
operate is challenging traditional Requirements Engineering (RE) approaches. This gave …
operate is challenging traditional Requirements Engineering (RE) approaches. This gave …
Agile approaches for cybersecurity systems, IoT and intelligent transportation
To adapt to the rapidly increasing vulnerabilities in software products and cyber threats that
exploit them, security professionals are actively working with software developers to produce …
exploit them, security professionals are actively working with software developers to produce …
Agile meets plan-driven–hybrid approaches in product development: A systematic literature review
More than 15 years after the publication of the agile manifesto of software development,
agile development approaches have also reached the processes of physical product …
agile development approaches have also reached the processes of physical product …
A novel lightweight solo software development methodology with optimum security practices
The diffusion of software into all areas of life and all forms of business, increases the
demand for high-quality and secure software products. Software development …
demand for high-quality and secure software products. Software development …
[PDF][PDF] IScrum: An improved scrum process model
S Ashraf, S Aftab - International Journal of Modern Education and …, 2017 - academia.edu
Resolving a wide domain of issues and offering a variety of benefits to software engineering,
makes the Agile process models attractive for researchers. Scrum has been recognized as …
makes the Agile process models attractive for researchers. Scrum has been recognized as …
Adoption of Information Security Practices in Large-Scale Agile Software Development: A Case Study in the Finance Industry
S Nägele, L Korn, F Matthes - … of the 18th International Conference on …, 2023 - dl.acm.org
Agile development methods have pervaded software engineering and are increasingly
applied in large projects and organizations. At the same time, security threats and restrictive …
applied in large projects and organizations. At the same time, security threats and restrictive …
Agile development of secure software for small and medium-sized enterprises
Although agile methods gained popularity and became globally widespread, develo**
secure software with agile methods remains a challenge. Method elements (ie, roles …
secure software with agile methods remains a challenge. Method elements (ie, roles …
Identifying Key Activities, Artifacts and Roles in Agile Engineering of Secure Software with Hierarchical Clustering
Different activities, artifacts, and roles can be found in the literature on the agile engineering
of secure software (AESS). The purpose of this paper is to consolidate them and thus identify …
of secure software (AESS). The purpose of this paper is to consolidate them and thus identify …
Using Scrum and unified modelling language to analyze and design an automatic course scheduling system
PS Chen, GYH Chen, SF Lien… - Journal of the Chinese …, 2019 - Taylor & Francis
This research used a case study methodology to examine large-scale software projects
accomplished despite ambiguous customer requirements. This study adopted Scrum as the …
accomplished despite ambiguous customer requirements. This study adopted Scrum as the …
Agile and secure software development: An unfinished story
D Bishop, P Rowland - 2019 - scholar.dsu.edu
Given the widespread adoption of agile methods and the rising number of software
vulnerabilities, we analyze the literature with an interest in the effect of security practices on …
vulnerabilities, we analyze the literature with an interest in the effect of security practices on …