Academic literature on the topic 'Software product security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software product security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software product security"
Rasheed, Hassan. "Vulnerability distribution scoring for software product security assessment." International Journal of Information and Computer Security 6, no. 3 (2014): 270. http://dx.doi.org/10.1504/ijics.2014.066653.
Full textMellado, Daniel, Eduardo Fernández-Medina, and Mario Piattini. "Security requirements engineering framework for software product lines." Information and Software Technology 52, no. 10 (2010): 1094–117. http://dx.doi.org/10.1016/j.infsof.2010.05.007.
Full textHussain, Shariq, Haris Anwaar, Kashif Sultan, et al. "Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model." Journal of Engineering 2024 (February 21, 2024): 1–15. http://dx.doi.org/10.1155/2024/9962691.
Full textZhang, Zan, Guofang Nan, and Yong Tan. "Cloud Services vs. On-Premises Software: Competition Under Security Risk and Product Customization." Information Systems Research 31, no. 3 (2020): 848–64. http://dx.doi.org/10.1287/isre.2019.0919.
Full textRianat Abbas, Sunday Jacob Nwanyim, Joy Awoleye Adesina, Augustine Udoka Obu, Adetomiwa Adesokan, and Jeremiah Folorunso. "Secure by design - enhancing software products with AI-Driven security measures." Computer Science & IT Research Journal 6, no. 3 (2025): 184–200. https://doi.org/10.51594/csitrj.v6i3.1880.
Full textPeldszus, Sven, Daniel Strüber, and Jan Jürjens. "Model-based security analysis of feature-oriented software product lines." ACM SIGPLAN Notices 53, no. 9 (2020): 93–106. http://dx.doi.org/10.1145/3393934.3278126.
Full textMellado, Daniel, Eduardo Fernández-Medina, and Mario Piattini. "Towards security requirements management for software product lines: A security domain requirements engineering process." Computer Standards & Interfaces 30, no. 6 (2008): 361–71. http://dx.doi.org/10.1016/j.csi.2008.03.004.
Full textRaschke, Wolfgang, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, Christian Steger, and Christian Kreiner. "Balancing Product and Process Assurance for Evolving Security Systems." International Journal of Secure Software Engineering 6, no. 1 (2015): 47–75. http://dx.doi.org/10.4018/ijsse.2015010103.
Full textLienkov, Serhii, Volodymyr Dzhuliy, Oleksandr Yavorskyi, and Kostyantyn Zatsepin. "Information security model of functioning software." Smart technologies: Industrial and Civil Engineering 2, no. 15 (2024): 31–45. https://doi.org/10.32347/st.2024.2.1202.
Full textNazarenko, M. A., A. I. Gorobets, D. V. Miskov, V. V. Muravyev, and A. S. Novikov. "ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA." Russian Technological Journal 7, no. 1 (2019): 48–56. http://dx.doi.org/10.32362/2500-316x-2019-7-1-48-56.
Full textDissertations / Theses on the topic "Software product security"
SILVEIRA, NETO Paulo Anselmo da Mota. "Assessing security in software product lines; a maintenance analysis." Universidade Federal de Pernambuco, 2017. https://repositorio.ufpe.br/handle/123456789/26968.
Full textBarta, Brian J. "An analysis of open source security software products downloads." Thesis, Capella University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3613581.
Full textMoyo, Sibonile. "A software development methodology for solo software developers: leveraging the product quality of independent developers." Thesis, 2020. http://hdl.handle.net/10500/27292.
Full textChien, Chih-liang, and 簡智亮. "Multiple-case Analysis of Intangible Asset Specificity、Concentration Ratios and Product Differentiation-the cases of Security Software Companies." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/99951758591915025645.
Full textNeves, Catarina Sofia Boto das. "Software design for an awareness score of coffee products." Master's thesis, 2022. http://hdl.handle.net/10362/134200.
Full textBooks on the topic "Software product security"
National Computer Security Center (U.S.), ed. Trusted product evaluation questionnaire. National Computer Security Center, 1990.
Find full textBlinovskaya, Yana, and Dar'ya Zadoya. Geoinformation systems in technosphere security. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1002663.
Full textQuinn, Stephen D. National Checklist Program for IT products: Guidelines for checklist users and developers : recommendations of the National Institute of Standards and Technology. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009.
Find full textPh.D. Jide B. Odubiyi. Building Survivable Systems: Principles and Applications for Complex Product, Process, and Organizational Change Models. Ilori Press, 2007.
Find full textSoftware Engineering: Software Development, Architecture, Design Patterns, Testing, Product Management, Project Lifecycle, TR5, Programming, Quality Assurance, Security Systems, Service and Practic. Independently Published, 2022.
Find full textSoftware Engineering: Software Development, Architecture, Design Patterns, Testing, TR5, Product Management, Project Lifecycle, Programming, Quality Assurance, Security Systems, Service and Practice. Independently Published, 2022.
Find full textStewart, Andrew J. A Vulnerable System. Cornell University Press, 2021. http://dx.doi.org/10.7591/cornell/9781501758942.001.0001.
Full textLaw, Committee on Cyberspace. Selling Products and Services and Licensing Software Online: An Interactive Guide with Legal Forms and Commentary to Privacy, Security and Consumer Law Issues. American Bar Association, 2008.
Find full textWilkinson, Frances C., and Sever Bordeianu, eds. The Complete Guide to RFPs for Libraries. ABC-CLIO, LLC, 2018. http://dx.doi.org/10.5040/9798400629761.
Full textBook chapters on the topic "Software product security"
Fægri, Tor Erlend, and Svein Hallsteinsen. "A Software Product Line Reference Architecture for Security." In Software Product Lines. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-33253-4_8.
Full textArciniegas, Jose L., Juan C. Dueñas, Jose L. Ruiz, Rodrigo Cerón, Jesus Bermejo, and Miguel A. Oltra. "Architecture Reasoning for Supporting Product Line Evolution: An Example on Security." In Software Product Lines. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-33253-4_9.
Full textJaatun, Martin Gilje, and Inger Anne Tøndel. "Playing Protection Poker for Practical Software Security." In Product-Focused Software Process Improvement. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49094-6_55.
Full textFockel, Markus, Sven Merschjohann, and Masud Fazal-Baqaie. "Threat Analysis in Practice – Systematically Deriving Security Requirements." In Product-Focused Software Process Improvement. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03673-7_25.
Full textFinnegan, Anita, Fergal McCaffery, and Gerry Coleman. "A Security Assurance Framework for Networked Medical Devices." In Product-Focused Software Process Improvement. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39259-7_35.
Full textOkubo, Takao, Yoshio Kakizaki, Takanori Kobashi, et al. "Security and Privacy Behavior Definition for Behavior Driven Development." In Product-Focused Software Process Improvement. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13835-0_28.
Full textBaninemeh, Elena, Harold Toomey, Katsiaryna Labunets, Gerard Wagenaar, and Slinger Jansen. "An Evaluation of the Product Security Maturity Model Through Case Studies at 15 Software Producing Organizations." In Lecture Notes in Business Information Processing. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53227-6_23.
Full textJasser, Stefanie. "Constraining the Implementation Through Architectural Security Rules: An Expert Study." In Product-Focused Software Process Improvement. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35333-9_15.
Full textBaca, Dejan, and Kai Petersen. "Prioritizing Countermeasures through the Countermeasure Method for Software Security (CM-Sec)." In Product-Focused Software Process Improvement. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13792-1_15.
Full textMoyón, Fabiola, Rafael Soares, Maria Pinto-Albuquerque, Daniel Mendez, and Kristian Beckers. "Integration of Security Standards in DevOps Pipelines: An Industry Case Study." In Product-Focused Software Process Improvement. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64148-1_27.
Full textConference papers on the topic "Software product security"
Rafi, Saima, Muhammad Azeem Akbar, and Arif Ali Khan. "Empirical Insights into Product Security Challenges and Practices in Software Development." In 2024 International Conference on Frontiers of Information Technology (FIT). IEEE, 2024. https://doi.org/10.1109/fit63703.2024.10838436.
Full textSonnekalb, Tim, Celestino Madera Castro, Bernd Gruner, Clemens-Alexander Brust, and Wolfram Amme. "Vulnerability Prediction and Assessment Using Software Product Metrics and Machine Learning: What Does Not Work." In 2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C). IEEE, 2024. http://dx.doi.org/10.1109/qrs-c63300.2024.00148.
Full textOjha, Ravish Kumar, Harish Kumar Rai, and Suresh Koduru. "Strategic Integration of Security Product Standard: A Comparative Study of Early vs. Late Implementation in Software Development." In 2024 First International Conference on Pioneering Developments in Computer Science & Digital Technologies (IC2SDT). IEEE, 2024. http://dx.doi.org/10.1109/ic2sdt62152.2024.10696301.
Full textPandey, Anupriya, and Kamal Singh. "Software Security Testing Lifecycle for Automotive Products." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679433.
Full textGaska, Thomas, Doug Summerville, Marilyn Gaska, and Yu Chen. "Model Based Engineering for Advanced Integrated Modular Avionics - Focus and Challenges." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12031.
Full text"SECURITY REQUIREMENTS IN SOFTWARE PRODUCT LINES." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001922804420449.
Full textSprovieri, Danilloo, Nikolaos Argyropoulos, Carine Souveyet, Raul Mazo, Haralambos Mouratidis, and Andrew Fish. "Security Alignment Analysis of Software Product Lines." In 2016 4th International Conference on Enterprise Systems (ES). IEEE, 2016. http://dx.doi.org/10.1109/es.2016.19.
Full textMellado, Daniel, Eduardo Fernandez-Medina, and Mario Piattini. "Security Requirements Variability for Software Product Lines." In 2008 Third International Conference on Availability, Reliability and Security. IEEE, 2008. http://dx.doi.org/10.1109/ares.2008.165.
Full textKenner, Andy, Richard May, Jacob Krüger, Gunter Saake, and Thomas Leich. "Safety, security, and configurable software systems." In SPLC '21: 25th ACM International Systems and Software Product Line Conference. ACM, 2021. http://dx.doi.org/10.1145/3461001.3471147.
Full textDziwok, Stefan, Sven Merschjohann, and Thorsten Koch. "A Software Security Study among German Developers, Product Owners, and Managers." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002208.
Full textReports on the topic "Software product security"
Ruby, Jeffrey, Richard Massaro, John Anderson, and Robert Fischer. Three-dimensional geospatial product generation from tactical sources, co-registration assessment, and considerations. Engineer Research and Development Center (U.S.), 2023. http://dx.doi.org/10.21079/11681/46442.
Full textŠulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, 2024. https://doi.org/10.57005/ab.2024.3.4.
Full textNagle, Frank, James Dana, Jennifer Hoffman, Steven Randazzo, and Yanuo Zhou. Census II of Free and Open Source Software — Application Libraries. The Linux Foundation, 2022. https://doi.org/10.70828/kheh5209.
Full textHendrick, Stephen. Software Bill of Materials (SBOM) and Cybersecurity Readiness. The Linux Foundation, 2022. https://doi.org/10.70828/rytl5793.
Full textWei, Wenbin, Nigel Blampied, and Raajmaathangi Sreevijay. Evaluation, Comparison, and Improvement Recommendations for Caltrans Financial Programming Processes and Tools. Mineta Transportation Institute, 2023. http://dx.doi.org/10.31979/mti.2023.2058.
Full text