A systematic map** study on security in agile requirements engineering

H Villamizar, M Kalinowski, M Viana… - 2018 44th Euromicro …, 2018 - ieeexplore.ieee.org
[Background] The rapidly changing business environments in which many companies
operate is challenging traditional Requirements Engineering (RE) approaches. This gave …

Agile approaches for cybersecurity systems, IoT and intelligent transportation

YM Tashtoush, DA Darweesh, G Husari… - IEEE …, 2021 - ieeexplore.ieee.org
To adapt to the rapidly increasing vulnerabilities in software products and cyber threats that
exploit them, security professionals are actively working with software developers to produce …

Agile meets plan-driven–hybrid approaches in product development: A systematic literature review

J Heimicke, R Chen, A Albers - Proceedings of the Design Society …, 2020 - cambridge.org
More than 15 years after the publication of the agile manifesto of software development,
agile development approaches have also reached the processes of physical product …

A novel lightweight solo software development methodology with optimum security practices

S Moyo, E Mnkandla - IEEE Access, 2020 - ieeexplore.ieee.org
The diffusion of software into all areas of life and all forms of business, increases the
demand for high-quality and secure software products. Software development …

[PDF][PDF] IScrum: An improved scrum process model

S Ashraf, S Aftab - International Journal of Modern Education and …, 2017 - academia.edu
Resolving a wide domain of issues and offering a variety of benefits to software engineering,
makes the Agile process models attractive for researchers. Scrum has been recognized as …

Adoption of Information Security Practices in Large-Scale Agile Software Development: A Case Study in the Finance Industry

S Nägele, L Korn, F Matthes - … of the 18th International Conference on …, 2023 - dl.acm.org
Agile development methods have pervaded software engineering and are increasingly
applied in large projects and organizations. At the same time, security threats and restrictive …

Agile development of secure software for small and medium-sized enterprises

A Mihelič, S Vrhovec, T Hovelja - Sustainability, 2023 - mdpi.com
Although agile methods gained popularity and became globally widespread, develo**
secure software with agile methods remains a challenge. Method elements (ie, roles …

Identifying Key Activities, Artifacts and Roles in Agile Engineering of Secure Software with Hierarchical Clustering

A Mihelič, T Hovelja, S Vrhovec - Applied Sciences, 2023 - mdpi.com
Different activities, artifacts, and roles can be found in the literature on the agile engineering
of secure software (AESS). The purpose of this paper is to consolidate them and thus identify …

Using Scrum and unified modelling language to analyze and design an automatic course scheduling system

PS Chen, GYH Chen, SF Lien… - Journal of the Chinese …, 2019 - Taylor & Francis
This research used a case study methodology to examine large-scale software projects
accomplished despite ambiguous customer requirements. This study adopted Scrum as the …

Agile and secure software development: An unfinished story

D Bishop, P Rowland - 2019 - scholar.dsu.edu
Given the widespread adoption of agile methods and the rising number of software
vulnerabilities, we analyze the literature with an interest in the effect of security practices on …