A conceptual model of agile software development in a safety-critical context: A systematic literature review

LT Heeager, PA Nielsen - Information and Software Technology, 2018 - Elsevier
Context Safety-critical software systems are increasingly being used in new application
areas, such as personal medical devices, traffic control, and detection of pathogens. A …

Towards the integration of security practices in agile software development: a systematic map** review

Y Valdés-Rodríguez, J Hochstetter-Diez… - Applied Sciences, 2023 - mdpi.com
Software development must be based on more than just the experience and capabilities of
your programmers and your team. The importance of obtaining a quality product lies in the …

[HTML][HTML] Security in agile software development: A practitioner survey

K Rindell, J Ruohonen, J Holvitie, S Hyrynsalmi… - Information and …, 2021 - Elsevier
Context: Software security engineering provides the means to define, implement and verify
security in software products. Software security engineering is performed by following a …

[PDF][PDF] The Waterfall Model and the Agile Methodologies: A comparison by project characteristics

W Van Casteren - Research Gate, 2017 - researchgate.net
Software development projects have long been plandriven processes, but the coming of age
of Agile Methodologies has given rise to a more adaptive approach to software/system …

Can security become a routine? A study of organizational change in an agile software development group

A Poller, L Kocksch, S Türpe, FA Epp… - Proceedings of the …, 2017 - dl.acm.org
Organizational factors influence the success of security initiatives in software development.
Security audits and developer training can motivate development teams to adopt security …

[HTML][HTML] CAESAR8: An agile enterprise architecture approach to managing information security risks

P Loft, Y He, I Yevseyeva, I Wagner - Computers & Security, 2022 - Elsevier
In theory, implementing an Enterprise Architecture (EA) should enable organizations to
increase the accuracy of information security risk assessments. In reality, however …

Scaling for agility: A reference model for hybrid traditional-agile software development methodologies

AQ Gill, B Henderson-Sellers, M Niazi - Information Systems Frontiers, 2018 - Springer
The adoption of agility at a large scale often requires the integration of agile and non-agile
development elements for architecting a hybrid adaptive methodology. The challenge is” …

Defining security requirements with the common criteria: Applications, adoptions, and challenges

N Sun, CT Li, H Chan, BD Le, MZ Islam… - IEEE …, 2022 - ieeexplore.ieee.org
Advances in emerging Information and Communications Technology (ICT) technologies
push the boundaries of what is possible and open up new markets for innovative ICT …

[PDF][PDF] Survey of cyber moving targets second edition

BC Ward, SR Gomez, R Skowyra, D Bigelow… - MIT Lincoln Laboratory …, 2018 - mit.edu
This survey provides an overview of different cyber moving-target techniques, their threat
models, and their technical details. A cyber moving-target technique refers to any technique …

Practitioners' perspectives on security in agile development

S Bartsch - 2011 Sixth International Conference on Availability …, 2011 - ieeexplore.ieee.org
Agile methods are widely employed to develop high-quality software, but theoretical
analyses argue that agile methods are inadequate for security-critical projects. However …