References:
[1] Srivastava. Amit. Kumar and K.
Shishir, ”An effective computational technique for taxonomic position of
security vulnerability in software development,” Journal of
Computational Science, vol. 25, pp. 388-396, March 2018.
[2] Li. Jin, Zhang. Yinghui, Chen.
Xiaofeng, and X. Yang, ”Secure attribute-based data sharing for
resource-limited users in cloud computing,” Computers &
Security, vol. 72, pp. 1-12, January 2018.
[3] Y. Lee and G. Lee, ”HW-CDI:
Hard-Wired Control Data Integrity,” IEEE Access, vol. 7, pp.
10811-10822, 2019.
[4] R. A. Khan, S. U. Khan, H. U.
Khan, and M. Ilyas, ”Systematic Literature Review on Security Risks and
its Practices in Secure Software Development,” IEEE Access, vol.
10, pp. 5456-5481, 2022.
[5] O. Olukoya, ”Assessing
frameworks for eliciting privacy & security requirements from laws and
regulations,” Computers & Security, vol. 117, p. 102697,
2022/06/01/ 2022.
[6] N. Dissanayake, A. Jayatilaka,
M. Zahedi, and M. A. Babar, ”Software security patch management - A
systematic literature review of challenges, approaches, tools and
practices,” Information and Software Technology, vol. 144, p.
106771, 2022/04/01/ 2022.
[7] H. Nina, J. A. Pow-Sang, and
M. Villavicencio, ”Systematic Mapping of the Literature on Secure
Software Development,” IEEE Access, vol. 9, pp. 36852-36867,
2021.
[8] S. V. Solms and L. A. Futcher,
”Adaption of a Secure Software Development Methodology for Secure
Engineering Design,” IEEE Access, vol. 8, pp. 125630-125637,
2020.
[9] A. Ramirez, A. Aiello, and S.
J. Lincke, ”A Survey and Comparison of Secure Software Development
Standards,” in 2020 13th CMI Conference on Cybersecurity and
Privacy (CMI) - Digital Transformation - Potentials and
Challenges(51275) , 2020, pp. 1-6.
[10] M. Niazi, A. M. Saeed, M.
Alshayeb, S. Mahmood, and S. Zafar, ”A maturity model for secure
requirements engineering,” Computers & Security, vol. 95, p.
101852, 2020/08/01/ 2020.
[11] D. Verdon and G. McGraw,
”Risk Analysis in Software Design,” IEEE Security and Privacy,vol. 2, pp. 79–84, 2004.
[12] S. Lipner, ”The Trustworthy
Computing Security Development Lifecycle,” presented at the Proceedings
of the 20th Annual Computer Security Applications Conference, 2004.
[13] S. Gupta, M. Faisal, and M.
Husain, ”Secure Software Development Process for Embedded Systems
Control,” International Journal of Engineering Sciences &
Emerging Technologies, vol. 4, pp. 133-143, 12/01 2012.
[14] M. Essafi, L. Jilani, and H.
Ben Ghezala, S2D-ProM: A Strategy Oriented Process Model for
Secure Software Development , 2007.
[15] J. Manico, ”OWASP ” inApplication Security Verification Standard 3.0.1 , ed, 2016, pp.
1-70.
[16] A. S. Sodiya, ”Towards
Building Secure Software Systems,” 01/01 2006.
[17] H. Al-Matouq, S. Mahmood, M.
Alshayeb, and M. Niazi, ”A Maturity Model for Secure Software Design: A
Multivocal Study,” IEEE Access, vol. 8, pp. 215758-215776, 2020.
[18] T. Li and Z. Chen, ”An
ontology-based learning approach for automatically classifying security
requirements,” Journal of Systems and Software, vol. 165, p.
110566, 2020/07/01/ 2020.
[19] R. Kumar and R. Goyal, ”On
cloud security requirements, threats, vulnerabilities and
countermeasures: A survey,” Computer Science Review, vol. 33, pp.
1-48, 2019/08/01/ 2019.
[20] Sharma. Anuradha and M. P.
Kumar, ”Aspects of Enhancing Security in Software Development Life
Cycle,” Advances in Computational Sciences and Technology, vol.
10, pp. 203-210, 2017.
[21] M. N. R, ”Identifying
security requirements using the security quality requirements
engineering (SQUARE) method,” Integrating Security and Software
Engineering, pp. 44–69, 2006.
[22] M. Alam, J. P. Seifert, and
X. Zhang, ”A Model-Driven Framework for Trusted Computing Based
Systems,” in 11th IEEE International Enterprise Distributed Object
Computing Conference (EDOC 2007) , 2007, pp. 75-75.
[23] H. Mouratidis, P. Giorgini,
and G. Manson, ”When Security Meets Software Engineering: A Case of
Modeling Secure Information Systems,” Journal of Information
Systems, vol. 30, pp. 609-629, 2005.
[24] Flechais. Ivan, M. Angela.
Sasse, and S. M. V. Hailes, ”Bringing Security Home: A process for
developing secure and usable systems ” in New Security Paradigms
Workshop , Ascona, Switzerland, 2003, pp. 49-57.
[25] M. Khari, Vaishali, and P.
Kumar, ”Embedding security in Software Development Life Cycle (SDLC),”
in 2016 3rd International Conference on Computing for Sustainable
Global Development (INDIACom) , 2016, pp. 2182-2186.
[26] M. Younas, M. A. Shah, D. N.
A. Jawawi, M. K. Ishfaq, M. Awais, K. Wakil, et al. , ”Elicitation
of Nonfunctional Requirements in Agile Development using Cloud Computing
Environment,” IEEE Access, pp. 1-1, 2020.
[27] B. Kitchenham, O. Pearl
Brereton, D. Budgen, M. Turner, J. Bailey, and S. Linkman, ”Systematic
literature reviews in software engineering – A systematic literature
review,” Information and Software Technology, vol. 51, pp. 7-15,
2009/01/01/ 2009.
[28] L. Zhang, J. Tian, and J.
Jiang, ”Empirical Research in Software Engineering — A Literature
Survey,” Jounrla of Computer Science Technology, vol. 33, pp.
876–899, 2018.
[29] S. Wagner, D. M. Fernández,
M. Felderer, A. Vetrò, M. Kalinowski, R. Wieringa, et al. ,
”Status Quo in Requirements Engineering: A Theory and a Global Family of
Surveys,” ACM Trans. Softw. Eng. Methodol., vol. 28, p. Article
9, 2019.
[30] M. Niazi, D. Wilson, and D.
Zowghi, ”Critical success factors for software process improvement
implementation: an empirical study,” Software Process: Improvement
and Practice, vol. 11, pp. 193-211, 03/01 2006.
[31] H. U. Rahman, M. Raza, P.
Afsar, and H. U. Khan, ”Empirical Investigation of Influencing Factors
Regarding Offshore Outsourcing Decision of Application Maintenance,”IEEE Access, vol. 9, pp. 58589-58608, 2021.
[32] M. A. Akbar, W. Naveed, A.
A. Alsanad, L. Alsuwaidan, A. Alsanad, A. Gumaei, et al. ,
”Requirements Change Management Challenges of Global Software
Development: An Empirical Investigation,” IEEE Access, vol. 8,
pp. 203070-203085, 2020.
[33] H. Mumtaz, M. Alshayeb, S.
Mahmood, and M. Niazi, ”An empirical study to improve software security
through the application of code refactoring,” Information and
Software Technology, vol. 96, pp. 112-125, 2018/04/01/ 2018.
[34] B. Kitchenham and S. L.
Pfleeger, ”Principles of survey research part 6: data analysis,”SIGSOFT Softw. Eng. Notes, vol. 28, pp. 24–27, 2003.
[35] A. A. Khan, M. Shameem, M.
Nadeem, and M. A. Akbar, ”Agile trends in Chinese global software
development industry: Fuzzy AHP based conceptual mapping,” Applied
Soft Computing, vol. 102, p. 107090, 2021/04/01/ 2021.
[36] B. Martin,Introduction to Medical Statistics , 4th Edition ed., 2015.
[37] S. A. P, ”Interpretive
structural modeling: Methodology for large scale systems. New York,
McGraw-Hill,” pp. 1-445, 1977.
[38] V. Ravi and R. Shankar,
”Analysis of interactions among the barriers of reverse logistics,”Technological Forecasting and Social Change, vol. 72, pp.
1011-1029, 2005/10/01/ 2005.
[39] H. Shakeri and M.
Khalilzadeh, ”Analysis of factors affecting project communications with
a hybrid DEMATEL-ISM approach (A case study in Iran),” Heliyon,vol. 6, p. e04430, 2020/08/01/ 2020.
[40] S. Rafi, M. A. Akbar, S.
Mahmood, A. Alsanad, and A. Alothaim, ”Selection of DevOps best test
practices: A hybrid approach using ISM and fuzzy TOPSIS analysis,”Journal of Software: Evolution and Process, vol. 34, p. e2448,
2022.
[41] S. Rafi, M. A. Akbar, W. Yu,
A. Alsanad, A. Gumaei, and M. U. Sarwar, ”Exploration of DevOps testing
process capabilities: An ISM and fuzzy TOPSIS analysis,” Applied
Soft Computing, vol. 116, p. 108377, 2022/02/01/ 2022.
[42] G. Kannan, S. Pokharel, and
P. Sasi Kumar, ”A hybrid approach using ISM and fuzzy TOPSIS for the
selection of reverse logistics provider,” Resources, Conservation
and Recycling, vol. 54, pp. 28-36, 2009/11/01/ 2009.
[43] A. Agarwal and P. Vrat,
”Modeling Attributes of Human Body Organization Using ISM and AHP,”Jindal Journal of Business Research, vol. 6, pp. 44-62, 2017.
[44] C. Sakar, B. Koseoglu, A. C.
Toz, and M. Buber, ”Analysing the effects of liquefaction on capsizing
through integrating interpretive structural modelling (ISM) and fuzzy
Bayesian networks (FBN),” Ocean Engineering, vol. 215, p. 107917,
2020/11/01/ 2020.
[45] M. N. Patel, A. A. Pujara,
R. Kant, and R. K. Malviya, ”Assessment of circular economy enablers:
Hybrid ISM and fuzzy MICMAC approach,” Journal of Cleaner
Production, vol. 317, p. 128387, 2021/10/01/ 2021.
[46] S. Salinger, L. Plonka, and
L. Prechelt, ”A Coding Scheme Development Methodology Using Grounded
Theory For Qualitative Analysis Of Pair Programming,” Human
Technology: An Interdisciplinary Journal on Humans in ICT Environments,vol. 4, 05/31 2008.
[47] M. Azeem Akbar, S. Mahmood,
A. Alsanad, and A. Com, ”Toward Successful DevSecOps in Software
Development Organizations: A Decision-Making Framework,”Information and Software Technology, vol. 147, 02/27 2022.
[48] M. Niazi, S. Mahmood, M.
Alshayeb, A. M. Qureshi, K. Faisal, and N. Cerpa, ”Toward successful
project management in global software development,” International
Journal of Project Management, vol. 34, pp. 1553-1567, 2016/11/01/
2016.
[49] A. Khan, M. Niazi, and S.
Hussain, ”Systematic Literature Study for Dimensional Classification of
Success Factors Affecting Process Improvement in Global Software
Development: Client-Vendor Perspective,” IET Software, vol. 12,
04/04 2018.
[50] W. Afzal, R. Torkar, and R.
Feldt, ”A systematic review of search-based testing for nonfunctional
system properties,” Information and Software Technology, vol. 51,
pp. 957-976, 2009/06/01/ 2009.
[51] N. Mead and T. Stehney,
”Security quality requirements engineering (SQUARE) methodology,”ACM SIGSOFT Software Engineering Notes, vol. 30, pp. 1-7, 07/01
2005.
[52] Y. Mufti, M. Niazi, M.
Alshayeb, and S. Mahmood, ”A Readiness Model for Security Requirements
Engineering,” IEEE Access, vol. 6, pp. 28611-28631, 2018.
[53] K. Rindell, J. Ruohonen, J.
Holvitie, S. Hyrynsalmi, and V. Leppänen, ”Security in agile software
development: A practitioner survey,” Information and Software
Technology, vol. 131, p. 106488, 2021/03/01/ 2021.
[54] M. Soni, End to End
Automation on Cloud with Build Pipeline: The Case for DevOps in
Insurance Industry, Continuous Integration, Continuous Testing, and
Continuous Delivery , 2015.
[55] R. Attri, S. Grover, N. Dev,
and D. Kumar, ”Analysis of barriers of total productive maintenance
(TPM),” International Journal of System Assurance Engineering and
Management, vol. 4, pp. 365-377, 2013/12/01 2013.
[56] J. N. Warfield, ”Developing
Interconnection Matrices in Structural Modeling,” IEEE
Transactions on Systems, Man, and Cybernetics, vol. SMC-4, pp. 81-87,
1974.
[57] C.-K. Kwong and H. Bai, ”A
fuzzy AHP approach to the determination of importance weights of
customer requirements in quality function deployment,” Journal of
intelligent manufacturing, vol. 13, pp. 367-377, 2002.
[58] C.-K. Kwong and H. Bai,
”Determining the importance weights for the customer requirements in QFD
using a fuzzy AHP with an extent analysis approach,” iie
Transactions, vol. 35, pp. 619-626, 2003.
[59] M. A. Akbar, M. Shameem, S.
Mahmood, A. Alsanad, and A. Gumaei, ”Prioritization based taxonomy of
cloud-based outsource software development challenges: Fuzzy AHP
analysis,” Applied Soft Computing, vol. 95, p. 106557, 2020.
[60] M. A. Akbar, J. Sang, A. A.
Khan, S. Mahmood, S. F. Qadri, H. Hu, et al. , ”Success factors
influencing requirements change management process in global software
development,” Journal of Computer Languages, vol. 51, pp.
112-130, 2019.