2015
DOI: 10.1016/j.procs.2015.08.155
|View full text |Cite
|
Sign up to set email alerts
|

A Case-based Management System for Secure Software Development Using Software Security Knowledge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…where 0 ≤α ≤ 1 and 0 ≤β≤ 1. Such that, ɳα(Loij)= (Miij-Loij).α+Loij (5) ɳα(Upij)=Upij-(Upij-Miij).α (6) Where α and β in these equations are used for the preferences of experts and intolerance of experts respectively. The values of α and β vary between 0 and 1.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…where 0 ≤α ≤ 1 and 0 ≤β≤ 1. Such that, ɳα(Loij)= (Miij-Loij).α+Loij (5) ɳα(Upij)=Upij-(Upij-Miij).α (6) Where α and β in these equations are used for the preferences of experts and intolerance of experts respectively. The values of α and β vary between 0 and 1.…”
Section: Methodsmentioning
confidence: 99%
“…Then, In (8) symbol I signify the unitary matrix. By applying equations (1)(2)(3)(4)(5)(6)(7)(8), the weights of every attribute with respect to all other attributes may be attained. For checking the consistency and continuing the AHP process, check the consistency ratio (CR) [31].…”
Section: C1mentioning
confidence: 99%
See 1 more Smart Citation
“…Here, E e numerator and denominator for each of the words in the "Effort-Change" equation are taken from the developer's responses to the respective standards above and assigned a numeric value accordingly. We have selected COCOMO because it is well established and nonproprietary [25].…”
Section: Major Items Of Costmentioning
confidence: 99%
“…Furthermore, the increase in malicious activities targeting software products and software security weaknesses has become a significant problem for the software development process. Likewise, it is necessary to address security issues from the beginning of the software development life cycle (and in each phase) instead of facing them by creating patches when the software is in the production phase [2]- [4]; therefore, a comprehensive model is needed to adapt security activities to the software development process [6]. The secure software development process comprises software requirements security, software design security, software construction security, and software testing security.…”
Section: Introductionmentioning
confidence: 99%