Journal articles on the topic 'Software product security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Software product security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Rasheed, Hassan. "Vulnerability distribution scoring for software product security assessment." International Journal of Information and Computer Security 6, no. 3 (2014): 270. http://dx.doi.org/10.1504/ijics.2014.066653.
Full textMellado, Daniel, Eduardo Fernández-Medina, and Mario Piattini. "Security requirements engineering framework for software product lines." Information and Software Technology 52, no. 10 (2010): 1094–117. http://dx.doi.org/10.1016/j.infsof.2010.05.007.
Full textHussain, Shariq, Haris Anwaar, Kashif Sultan, et al. "Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model." Journal of Engineering 2024 (February 21, 2024): 1–15. http://dx.doi.org/10.1155/2024/9962691.
Full textZhang, Zan, Guofang Nan, and Yong Tan. "Cloud Services vs. On-Premises Software: Competition Under Security Risk and Product Customization." Information Systems Research 31, no. 3 (2020): 848–64. http://dx.doi.org/10.1287/isre.2019.0919.
Full textRianat Abbas, Sunday Jacob Nwanyim, Joy Awoleye Adesina, Augustine Udoka Obu, Adetomiwa Adesokan, and Jeremiah Folorunso. "Secure by design - enhancing software products with AI-Driven security measures." Computer Science & IT Research Journal 6, no. 3 (2025): 184–200. https://doi.org/10.51594/csitrj.v6i3.1880.
Full textPeldszus, Sven, Daniel Strüber, and Jan Jürjens. "Model-based security analysis of feature-oriented software product lines." ACM SIGPLAN Notices 53, no. 9 (2020): 93–106. http://dx.doi.org/10.1145/3393934.3278126.
Full textMellado, Daniel, Eduardo Fernández-Medina, and Mario Piattini. "Towards security requirements management for software product lines: A security domain requirements engineering process." Computer Standards & Interfaces 30, no. 6 (2008): 361–71. http://dx.doi.org/10.1016/j.csi.2008.03.004.
Full textRaschke, Wolfgang, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, Christian Steger, and Christian Kreiner. "Balancing Product and Process Assurance for Evolving Security Systems." International Journal of Secure Software Engineering 6, no. 1 (2015): 47–75. http://dx.doi.org/10.4018/ijsse.2015010103.
Full textLienkov, Serhii, Volodymyr Dzhuliy, Oleksandr Yavorskyi, and Kostyantyn Zatsepin. "Information security model of functioning software." Smart technologies: Industrial and Civil Engineering 2, no. 15 (2024): 31–45. https://doi.org/10.32347/st.2024.2.1202.
Full textNazarenko, M. A., A. I. Gorobets, D. V. Miskov, V. V. Muravyev, and A. S. Novikov. "ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA." Russian Technological Journal 7, no. 1 (2019): 48–56. http://dx.doi.org/10.32362/2500-316x-2019-7-1-48-56.
Full textMellado, D., E. Fernandez-Medina, and M. Piattini. "Applying a Security Domain Requirements Engineering Process for Software Product Lines." IEEE Latin America Transactions 6, no. 3 (2008): 298–305. http://dx.doi.org/10.1109/tla.2008.4653861.
Full textSpafford, Eugene. "Hacker Challenges in Security Product Testing." EDPACS 23, no. 11 (1996): 14–16. http://dx.doi.org/10.1080/07366989609451392.
Full textSavola, Reijo, Christian Frühwirth, and Ari Pietikäinen. "Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study." JUCS - Journal of Universal Computer Science 18, no. (12) (2012): 1679–702. https://doi.org/10.3217/jucs-018-12-1679.
Full textDziatkovskii, Anton, and Uladzimir Hryneuski. "The possibilities of ensuring the security of the software product in the conditions of unauthorized access." Economic Annals-ХХI 189, no. 5-6(1) (2021): 90–100. http://dx.doi.org/10.21003/ea.v189-09.
Full textNjuki, Jane Wanjiru, Geoffrey Muchiri Muketha, and John Gichuki Ndia. "An Extended Security Measurement Framework for Open-Source Enterprise Resource Planning Software Security." International Journal of Network Security & Its Applications 14, no. 5 (2022): 51–63. http://dx.doi.org/10.5121/ijnsa.2022.14505.
Full textJane, Wanjiru Njuki, Muchiri Muketha Geoffrey, and Gichuki Ndia John. "AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURCE PLANNING SOFTWARE SECURITY." International Journal of Network Security & Its Applications (IJNSA) 14, no. 5 (2022): 51–63. https://doi.org/10.5281/zenodo.7251190.
Full textKelin, A. R. Darshika, B. Nagarajan, Sasikumar Rajendran, and Muthumari S. "Automatic Bug Classification System to Improve the Software Organization Product Performance." International Journal of Sociotechnology and Knowledge Development 14, no. 1 (2022): 1–17. http://dx.doi.org/10.4018/ijskd.310066.
Full textOleh Polihenko, Roman Odarchenko, and Sergiy Gnatyuk. "ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE FOR MOBILE NETWORK OPERATORS." European Cooperation 3, no. 47 (2020): 43–52. http://dx.doi.org/10.32070/ec.v3i47.89.
Full textСеменов, С. Г., Чжан Ліцзян, Цао Вейлінь, and В. В. Давидов. "Development of protecting a software product mathematical model from unlicensed copying based on the GERT method." Системи обробки інформації, no. 1(164) (March 17, 2021): 73–82. http://dx.doi.org/10.30748/soi.2021.164.08.
Full textCastro, Thiago, Leopoldo Teixeira, Vander Alves, Sven Apel, Maxime Cordy, and Rohit Gheyi. "A Formal Framework of Software Product Line Analyses." ACM Transactions on Software Engineering and Methodology 30, no. 3 (2021): 1–37. http://dx.doi.org/10.1145/3442389.
Full textIuganson, Andrei, and Danil Zakoldaev. "Approach to assessment of firmware security under fuzzy input data." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, no. 1 (2020): 50–56. http://dx.doi.org/10.24143/2072-9502-2020-1-50-56.
Full textRindell, Kalle, Sami Hyrynsalmi, and Ville Leppänen. "Case Study of Agile Security Engineering." International Journal of Secure Software Engineering 8, no. 1 (2017): 43–57. http://dx.doi.org/10.4018/ijsse.2017010103.
Full textZhukovskaya, I. E. "Today’s Trends of Software Product Import-Substitution in Conditions of Economy Digitalization." Vestnik of the Plekhanov Russian University of Economics, no. 3 (May 23, 2024): 173–81. http://dx.doi.org/10.21686/2413-2829-2024-3-173-181.
Full textGeorge, Sam, and K. David. "Security Strategies for Safe Dataand Content Access in OperationalModules of Product DataManagement Software." Journal of Cyber Security and Mobility 7, no. 1 (2018): 87–94. http://dx.doi.org/10.13052/jcsm2245-1439.717.
Full textAugust, Terrence, Duy Dao, and Kihoon Kim. "Market Segmentation and Software Security: Pricing Patching Rights." Management Science 65, no. 10 (2019): 4575–97. http://dx.doi.org/10.1287/mnsc.2018.3153.
Full textRozhnova, Tatyana, Valeriia Tomachynska, and Denis Korsun. "Life cycle models, principles and methodologies of software development." InterConf, no. 28(137) (December 20, 2022): 394–401. http://dx.doi.org/10.51582/interconf.19-20.12.2022.040.
Full textYevhenii, Ivanchenko. "Fundamental Principles of Cybersecurity in The Software Testing Process." American Journal of Engineering and Technology 07, no. 04 (2025): 105–12. https://doi.org/10.37547/tajet/volume07issue04-14.
Full textM, Savitha, and Dr Nagaraj G. Cholli. "Agile Methodologies In The Automotive Industry: A Comprehensive Survey." IOSR Journal of Mechanical and Civil Engineering 21, no. 5 (2024): 30–35. http://dx.doi.org/10.9790/1684-2105023035.
Full textOluwasanmi, Raphael Kolawole. "Managing Scope Creeps in Product Led Software-Based Organizations." Advances in Multidisciplinary & Scientific Research Journal Publication 12, no. 1 (2024): 75–84. http://dx.doi.org/10.22624/aims/digital/v12n1p6.
Full textGiarratana, Marco S., and Andrea Fosfuri. "Product Strategies and Survival in Schumpeterian Environments: Evidence from the US Security Software Industry." Organization Studies 28, no. 6 (2007): 909–29. http://dx.doi.org/10.1177/0170840607075267.
Full textAbunadi, Ibrahim, and Mamdouh Alenezi. "An Empirical Investigation of Security Vulnerabilities within Web Applications." JUCS - Journal of Universal Computer Science 22, no. (4) (2016): 537–51. https://doi.org/10.3217/jucs-022-04-0537.
Full textValdés-Rodríguez, Yolanda, Jorge Hochstetter-Diez, Jaime Díaz-Arancibia, and Rodrigo Cadena-Martínez. "Towards the Integration of Security Practices in Agile Software Development: A Systematic Mapping Review." Applied Sciences 13, no. 7 (2023): 4578. http://dx.doi.org/10.3390/app13074578.
Full textNeves, Ângelo, and Gisele Lemes Veiga Araujo. "Smart Automation for Enhancing Cyber-Security." Foresight and STI Governance 17, no. 1 (2023): 89–97. http://dx.doi.org/10.17323/2500-2597.2023.1.89.97.
Full textMugarza, Imanol, Jose Luis Flores, and Jose Luis Montero. "Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era." Sensors 20, no. 24 (2020): 7160. http://dx.doi.org/10.3390/s20247160.
Full textHani, Syeda Umema, and Abu Turab Alam. "Software Development for Information System - Achieving Optimum Quality with Security." International Journal of Information System Modeling and Design 8, no. 4 (2017): 1–20. http://dx.doi.org/10.4018/ijismd.2017100101.
Full textSreenivasa, Rao Sola. "Data Integrity with Oracle ERP Cloud's Product Data Hub: A Guide to Effective Governance." International Journal of Leading Research Publication 4, no. 10 (2023): 1–14. https://doi.org/10.5281/zenodo.15259101.
Full textAliyah, Siti Maslikhatun, Sugeng Purwanto, and Reiga Ritomiea Ariescy. "Analisis Keragaman Produk dan Keamanan terhadap Minat Beli pada Marketplace Sociolla di Surabaya." Al-Kharaj : Jurnal Ekonomi, Keuangan & Bisnis Syariah 6, no. 2 (2023): 2882–89. http://dx.doi.org/10.47467/alkharaj.v6i2.4153.
Full textKasım, Ömer. "Agile Software Development with Secure and Scrum-Centric Approach." AJIT-e: Academic Journal of Information Technology 15, no. 4 (2024): 292–308. https://doi.org/10.5824/ajite.2024.04.002.x.
Full textBawane, Manjiri R., Madhavi S. Borkar, Payal R. Wawarkar, Sanika M. Shende, Heena K. Chandel, and Ketki R. Bhakare. "USB Key Based Antipiracy Solution." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 2 (2015): 12–17. http://dx.doi.org/10.53555/nncse.v2i2.507.
Full textPrakash, Satya, Abhishek Vaish, Natalie Coul, SaravanaKumar G, T. N. Srinidhi, and Jayaprasad Botsa. "Child Security in Cyberspace Through Moral Cognition." International Journal of Information Security and Privacy 7, no. 1 (2013): 16–29. http://dx.doi.org/10.4018/jisp.2013010102.
Full textRidhima, Arora, and Handa Manu. "Designing Agile Engineering Frameworks: A Product Management Approach to Developing Customer-Centric Software Platforms." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 8, no. 1 (2020): 1–20. https://doi.org/10.5281/zenodo.14059506.
Full textSri Widya Harahap, Azizah Anisa, Siti Nuraini Pane, and Muhammad Arief Rahmadiansyah Purba. "DATABASE MANAGEMENT SYSTEM PT SIERAD PRODUCE Tbk DI MEDAN." JURNAL ILMIAH SAINS TEKNOLOGI DAN INFORMASI 1, no. 3 (2023): 20–26. https://doi.org/10.59024/jiti.v1i3.281.
Full textSamra, Hardeep Singh. "Study on Non Functional Software Testing." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (2013): 151–55. http://dx.doi.org/10.24297/ijct.v4i1c.3115.
Full textDalimunthe, Septian Rizky, Sri Anisa Pujawati, and Akmal Satria Alvin Sitorus. "TECHNICAL SECURITY IN ITE LAW AND COPYRIGHTS OF DEVICES AND SYSTEMS." POLICY, LAW, NOTARY AND REGULATORY ISSUES (POLRI) 1, no. 2 (2022): 27–36. http://dx.doi.org/10.55047/polri.v1i2.124.
Full textShlaifer, M., and Oleh Mykytyn. "Improvement of the information security of the management system." Management and Entrepreneurship in Ukraine: the stages of formation and problems of development 2022, no. 2 (2022): 148–55. http://dx.doi.org/10.23939/smeu2022.02.148.
Full textPoth, Alexander, Mario Kottke, Kerstin Middelhauve, Torsten Mahr, and Andreas Riel. "Lean integration of IT security and data privacy governance aspects into product development in agile organizations." JUCS - Journal of Universal Computer Science 27, no. (8) (2021): 868–93. https://doi.org/10.3897/jucs.71770.
Full textPratik, Bansal. "Investigating The Role of Software Testing Methodologies in Ensuring Product Quality and Reliability Across Diverse Industries, Including Healthcare, Finance and Transportation." Journal of Scientific and Engineering Research 8, no. 2 (2021): 283–85. https://doi.org/10.5281/zenodo.12792478.
Full textDiviziniuk, M. M., O. V. Farrakhov, I. S. Zinovieva, V. O. Kutsenko, and R. Shevchuk. "About the methodology to improve concept of maximum security of nuclear facility at minimum costs." IOP Conference Series: Earth and Environmental Science 1415, no. 1 (2024): 012123. https://doi.org/10.1088/1755-1315/1415/1/012123.
Full textBazzi, Abir, Adnan Shaout, and Di Ma. "Software Update Methodologies for Feature-Based Product Lines: A Combined Design Approach." Software 3, no. 3 (2024): 328–44. http://dx.doi.org/10.3390/software3030017.
Full textPoth, Alexander, Mario Kottke, Kerstin Middelhauve, Torsten Mahr, and Andreas Riel. "Lean integration of IT security and data privacy governance aspects into product development in agile organizations." JUCS - Journal of Universal Computer Science 27, no. 8 (2021): 868–93. http://dx.doi.org/10.3897/jucs.71770.
Full text