A conceptual model of agile software development in a safety-critical context: A systematic literature review
LT Heeager, PA Nielsen - Information and Software Technology, 2018 - Elsevier
Context Safety-critical software systems are increasingly being used in new application
areas, such as personal medical devices, traffic control, and detection of pathogens. A …
areas, such as personal medical devices, traffic control, and detection of pathogens. A …
Towards the integration of security practices in agile software development: a systematic map** review
Y Valdés-Rodríguez, J Hochstetter-Diez… - Applied Sciences, 2023 - mdpi.com
Software development must be based on more than just the experience and capabilities of
your programmers and your team. The importance of obtaining a quality product lies in the …
your programmers and your team. The importance of obtaining a quality product lies in the …
[HTML][HTML] Security in agile software development: A practitioner survey
Context: Software security engineering provides the means to define, implement and verify
security in software products. Software security engineering is performed by following a …
security in software products. Software security engineering is performed by following a …
[PDF][PDF] The Waterfall Model and the Agile Methodologies: A comparison by project characteristics
W Van Casteren - Research Gate, 2017 - researchgate.net
Software development projects have long been plandriven processes, but the coming of age
of Agile Methodologies has given rise to a more adaptive approach to software/system …
of Agile Methodologies has given rise to a more adaptive approach to software/system …
Can security become a routine? A study of organizational change in an agile software development group
Organizational factors influence the success of security initiatives in software development.
Security audits and developer training can motivate development teams to adopt security …
Security audits and developer training can motivate development teams to adopt security …
[HTML][HTML] CAESAR8: An agile enterprise architecture approach to managing information security risks
In theory, implementing an Enterprise Architecture (EA) should enable organizations to
increase the accuracy of information security risk assessments. In reality, however …
increase the accuracy of information security risk assessments. In reality, however …
Scaling for agility: A reference model for hybrid traditional-agile software development methodologies
The adoption of agility at a large scale often requires the integration of agile and non-agile
development elements for architecting a hybrid adaptive methodology. The challenge is” …
development elements for architecting a hybrid adaptive methodology. The challenge is” …
Defining security requirements with the common criteria: Applications, adoptions, and challenges
Advances in emerging Information and Communications Technology (ICT) technologies
push the boundaries of what is possible and open up new markets for innovative ICT …
push the boundaries of what is possible and open up new markets for innovative ICT …
[PDF][PDF] Survey of cyber moving targets second edition
This survey provides an overview of different cyber moving-target techniques, their threat
models, and their technical details. A cyber moving-target technique refers to any technique …
models, and their technical details. A cyber moving-target technique refers to any technique …
Practitioners' perspectives on security in agile development
S Bartsch - 2011 Sixth International Conference on Availability …, 2011 - ieeexplore.ieee.org
Agile methods are widely employed to develop high-quality software, but theoretical
analyses argue that agile methods are inadequate for security-critical projects. However …
analyses argue that agile methods are inadequate for security-critical projects. However …