References:
[1] Srivastava. Amit. Kumar and K. Shishir, ”An effective computational technique for taxonomic position of security vulnerability in software development,” Journal of Computational Science, vol. 25, pp. 388-396, March 2018.
[2] Li. Jin, Zhang. Yinghui, Chen. Xiaofeng, and X. Yang, ”Secure attribute-based data sharing for resource-limited users in cloud computing,” Computers & Security, vol. 72, pp. 1-12, January 2018.
[3] Y. Lee and G. Lee, ”HW-CDI: Hard-Wired Control Data Integrity,” IEEE Access, vol. 7, pp. 10811-10822, 2019.
[4] R. A. Khan, S. U. Khan, H. U. Khan, and M. Ilyas, ”Systematic Literature Review on Security Risks and its Practices in Secure Software Development,” IEEE Access, vol. 10, pp. 5456-5481, 2022.
[5] O. Olukoya, ”Assessing frameworks for eliciting privacy & security requirements from laws and regulations,” Computers & Security, vol. 117, p. 102697, 2022/06/01/ 2022.
[6] N. Dissanayake, A. Jayatilaka, M. Zahedi, and M. A. Babar, ”Software security patch management - A systematic literature review of challenges, approaches, tools and practices,” Information and Software Technology, vol. 144, p. 106771, 2022/04/01/ 2022.
[7] H. Nina, J. A. Pow-Sang, and M. Villavicencio, ”Systematic Mapping of the Literature on Secure Software Development,” IEEE Access, vol. 9, pp. 36852-36867, 2021.
[8] S. V. Solms and L. A. Futcher, ”Adaption of a Secure Software Development Methodology for Secure Engineering Design,” IEEE Access, vol. 8, pp. 125630-125637, 2020.
[9] A. Ramirez, A. Aiello, and S. J. Lincke, ”A Survey and Comparison of Secure Software Development Standards,” in 2020 13th CMI Conference on Cybersecurity and Privacy (CMI) - Digital Transformation - Potentials and Challenges(51275) , 2020, pp. 1-6.
[10] M. Niazi, A. M. Saeed, M. Alshayeb, S. Mahmood, and S. Zafar, ”A maturity model for secure requirements engineering,” Computers & Security, vol. 95, p. 101852, 2020/08/01/ 2020.
[11] D. Verdon and G. McGraw, ”Risk Analysis in Software Design,” IEEE Security and Privacy,vol. 2, pp. 79–84, 2004.
[12] S. Lipner, ”The Trustworthy Computing Security Development Lifecycle,” presented at the Proceedings of the 20th Annual Computer Security Applications Conference, 2004.
[13] S. Gupta, M. Faisal, and M. Husain, ”Secure Software Development Process for Embedded Systems Control,” International Journal of Engineering Sciences & Emerging Technologies, vol. 4, pp. 133-143, 12/01 2012.
[14] M. Essafi, L. Jilani, and H. Ben Ghezala, S2D-ProM: A Strategy Oriented Process Model for Secure Software Development , 2007.
[15] J. Manico, ”OWASP ” inApplication Security Verification Standard 3.0.1 , ed, 2016, pp. 1-70.
[16] A. S. Sodiya, ”Towards Building Secure Software Systems,” 01/01 2006.
[17] H. Al-Matouq, S. Mahmood, M. Alshayeb, and M. Niazi, ”A Maturity Model for Secure Software Design: A Multivocal Study,” IEEE Access, vol. 8, pp. 215758-215776, 2020.
[18] T. Li and Z. Chen, ”An ontology-based learning approach for automatically classifying security requirements,” Journal of Systems and Software, vol. 165, p. 110566, 2020/07/01/ 2020.
[19] R. Kumar and R. Goyal, ”On cloud security requirements, threats, vulnerabilities and countermeasures: A survey,” Computer Science Review, vol. 33, pp. 1-48, 2019/08/01/ 2019.
[20] Sharma. Anuradha and M. P. Kumar, ”Aspects of Enhancing Security in Software Development Life Cycle,” Advances in Computational Sciences and Technology, vol. 10, pp. 203-210, 2017.
[21] M. N. R, ”Identifying security requirements using the security quality requirements engineering (SQUARE) method,” Integrating Security and Software Engineering, pp. 44–69, 2006.
[22] M. Alam, J. P. Seifert, and X. Zhang, ”A Model-Driven Framework for Trusted Computing Based Systems,” in 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007) , 2007, pp. 75-75.
[23] H. Mouratidis, P. Giorgini, and G. Manson, ”When Security Meets Software Engineering: A Case of Modeling Secure Information Systems,” Journal of Information Systems, vol. 30, pp. 609-629, 2005.
[24] Flechais. Ivan, M. Angela. Sasse, and S. M. V. Hailes, ”Bringing Security Home: A process for developing secure and usable systems ” in New Security Paradigms Workshop , Ascona, Switzerland, 2003, pp. 49-57.
[25] M. Khari, Vaishali, and P. Kumar, ”Embedding security in Software Development Life Cycle (SDLC),” in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) , 2016, pp. 2182-2186.
[26] M. Younas, M. A. Shah, D. N. A. Jawawi, M. K. Ishfaq, M. Awais, K. Wakil, et al. , ”Elicitation of Nonfunctional Requirements in Agile Development using Cloud Computing Environment,” IEEE Access, pp. 1-1, 2020.
[27] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, and S. Linkman, ”Systematic literature reviews in software engineering – A systematic literature review,” Information and Software Technology, vol. 51, pp. 7-15, 2009/01/01/ 2009.
[28] L. Zhang, J. Tian, and J. Jiang, ”Empirical Research in Software Engineering — A Literature Survey,” Jounrla of Computer Science Technology, vol. 33, pp. 876–899, 2018.
[29] S. Wagner, D. M. Fernández, M. Felderer, A. Vetrò, M. Kalinowski, R. Wieringa, et al. , ”Status Quo in Requirements Engineering: A Theory and a Global Family of Surveys,” ACM Trans. Softw. Eng. Methodol., vol. 28, p. Article 9, 2019.
[30] M. Niazi, D. Wilson, and D. Zowghi, ”Critical success factors for software process improvement implementation: an empirical study,” Software Process: Improvement and Practice, vol. 11, pp. 193-211, 03/01 2006.
[31] H. U. Rahman, M. Raza, P. Afsar, and H. U. Khan, ”Empirical Investigation of Influencing Factors Regarding Offshore Outsourcing Decision of Application Maintenance,”IEEE Access, vol. 9, pp. 58589-58608, 2021.
[32] M. A. Akbar, W. Naveed, A. A. Alsanad, L. Alsuwaidan, A. Alsanad, A. Gumaei, et al. , ”Requirements Change Management Challenges of Global Software Development: An Empirical Investigation,” IEEE Access, vol. 8, pp. 203070-203085, 2020.
[33] H. Mumtaz, M. Alshayeb, S. Mahmood, and M. Niazi, ”An empirical study to improve software security through the application of code refactoring,” Information and Software Technology, vol. 96, pp. 112-125, 2018/04/01/ 2018.
[34] B. Kitchenham and S. L. Pfleeger, ”Principles of survey research part 6: data analysis,”SIGSOFT Softw. Eng. Notes, vol. 28, pp. 24–27, 2003.
[35] A. A. Khan, M. Shameem, M. Nadeem, and M. A. Akbar, ”Agile trends in Chinese global software development industry: Fuzzy AHP based conceptual mapping,” Applied Soft Computing, vol. 102, p. 107090, 2021/04/01/ 2021.
[36] B. Martin,Introduction to Medical Statistics , 4th Edition ed., 2015.
[37] S. A. P, ”Interpretive structural modeling: Methodology for large scale systems. New York, McGraw-Hill,” pp. 1-445, 1977.
[38] V. Ravi and R. Shankar, ”Analysis of interactions among the barriers of reverse logistics,”Technological Forecasting and Social Change, vol. 72, pp. 1011-1029, 2005/10/01/ 2005.
[39] H. Shakeri and M. Khalilzadeh, ”Analysis of factors affecting project communications with a hybrid DEMATEL-ISM approach (A case study in Iran),” Heliyon,vol. 6, p. e04430, 2020/08/01/ 2020.
[40] S. Rafi, M. A. Akbar, S. Mahmood, A. Alsanad, and A. Alothaim, ”Selection of DevOps best test practices: A hybrid approach using ISM and fuzzy TOPSIS analysis,”Journal of Software: Evolution and Process, vol. 34, p. e2448, 2022.
[41] S. Rafi, M. A. Akbar, W. Yu, A. Alsanad, A. Gumaei, and M. U. Sarwar, ”Exploration of DevOps testing process capabilities: An ISM and fuzzy TOPSIS analysis,” Applied Soft Computing, vol. 116, p. 108377, 2022/02/01/ 2022.
[42] G. Kannan, S. Pokharel, and P. Sasi Kumar, ”A hybrid approach using ISM and fuzzy TOPSIS for the selection of reverse logistics provider,” Resources, Conservation and Recycling, vol. 54, pp. 28-36, 2009/11/01/ 2009.
[43] A. Agarwal and P. Vrat, ”Modeling Attributes of Human Body Organization Using ISM and AHP,”Jindal Journal of Business Research, vol. 6, pp. 44-62, 2017.
[44] C. Sakar, B. Koseoglu, A. C. Toz, and M. Buber, ”Analysing the effects of liquefaction on capsizing through integrating interpretive structural modelling (ISM) and fuzzy Bayesian networks (FBN),” Ocean Engineering, vol. 215, p. 107917, 2020/11/01/ 2020.
[45] M. N. Patel, A. A. Pujara, R. Kant, and R. K. Malviya, ”Assessment of circular economy enablers: Hybrid ISM and fuzzy MICMAC approach,” Journal of Cleaner Production, vol. 317, p. 128387, 2021/10/01/ 2021.
[46] S. Salinger, L. Plonka, and L. Prechelt, ”A Coding Scheme Development Methodology Using Grounded Theory For Qualitative Analysis Of Pair Programming,” Human Technology: An Interdisciplinary Journal on Humans in ICT Environments,vol. 4, 05/31 2008.
[47] M. Azeem Akbar, S. Mahmood, A. Alsanad, and A. Com, ”Toward Successful DevSecOps in Software Development Organizations: A Decision-Making Framework,”Information and Software Technology, vol. 147, 02/27 2022.
[48] M. Niazi, S. Mahmood, M. Alshayeb, A. M. Qureshi, K. Faisal, and N. Cerpa, ”Toward successful project management in global software development,” International Journal of Project Management, vol. 34, pp. 1553-1567, 2016/11/01/ 2016.
[49] A. Khan, M. Niazi, and S. Hussain, ”Systematic Literature Study for Dimensional Classification of Success Factors Affecting Process Improvement in Global Software Development: Client-Vendor Perspective,” IET Software, vol. 12, 04/04 2018.
[50] W. Afzal, R. Torkar, and R. Feldt, ”A systematic review of search-based testing for nonfunctional system properties,” Information and Software Technology, vol. 51, pp. 957-976, 2009/06/01/ 2009.
[51] N. Mead and T. Stehney, ”Security quality requirements engineering (SQUARE) methodology,”ACM SIGSOFT Software Engineering Notes, vol. 30, pp. 1-7, 07/01 2005.
[52] Y. Mufti, M. Niazi, M. Alshayeb, and S. Mahmood, ”A Readiness Model for Security Requirements Engineering,” IEEE Access, vol. 6, pp. 28611-28631, 2018.
[53] K. Rindell, J. Ruohonen, J. Holvitie, S. Hyrynsalmi, and V. Leppänen, ”Security in agile software development: A practitioner survey,” Information and Software Technology, vol. 131, p. 106488, 2021/03/01/ 2021.
[54] M. Soni, End to End Automation on Cloud with Build Pipeline: The Case for DevOps in Insurance Industry, Continuous Integration, Continuous Testing, and Continuous Delivery , 2015.
[55] R. Attri, S. Grover, N. Dev, and D. Kumar, ”Analysis of barriers of total productive maintenance (TPM),” International Journal of System Assurance Engineering and Management, vol. 4, pp. 365-377, 2013/12/01 2013.
[56] J. N. Warfield, ”Developing Interconnection Matrices in Structural Modeling,” IEEE Transactions on Systems, Man, and Cybernetics, vol. SMC-4, pp. 81-87, 1974.
[57] C.-K. Kwong and H. Bai, ”A fuzzy AHP approach to the determination of importance weights of customer requirements in quality function deployment,” Journal of intelligent manufacturing, vol. 13, pp. 367-377, 2002.
[58] C.-K. Kwong and H. Bai, ”Determining the importance weights for the customer requirements in QFD using a fuzzy AHP with an extent analysis approach,” iie Transactions, vol. 35, pp. 619-626, 2003.
[59] M. A. Akbar, M. Shameem, S. Mahmood, A. Alsanad, and A. Gumaei, ”Prioritization based taxonomy of cloud-based outsource software development challenges: Fuzzy AHP analysis,” Applied Soft Computing, vol. 95, p. 106557, 2020.
[60] M. A. Akbar, J. Sang, A. A. Khan, S. Mahmood, S. F. Qadri, H. Hu, et al. , ”Success factors influencing requirements change management process in global software development,” Journal of Computer Languages, vol. 51, pp. 112-130, 2019.