2022
DOI: 10.1016/j.jss.2021.111137
|View full text |Cite
|
Sign up to set email alerts
|

Moderator factors of software security and performance verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…The planning phase includes requirement prioritization, dependency identification, and time and budget for performing SAP verification activities. Further, a well-planned and transparent methodology for performing SAP verification should be defined to smoothly execute the verification process [8,10,29].…”
Section: Sap Verification Planning and Methodologymentioning
confidence: 99%
See 4 more Smart Citations
“…The planning phase includes requirement prioritization, dependency identification, and time and budget for performing SAP verification activities. Further, a well-planned and transparent methodology for performing SAP verification should be defined to smoothly execute the verification process [8,10,29].…”
Section: Sap Verification Planning and Methodologymentioning
confidence: 99%
“…The paper [26] presents an evidence-based body of knowledge that characterizes the most important NFRs for software systems and appropriate testing methodologies for evaluating these requirements. The study further delves into the SAP verification procedures used in software development companies and the MFs that influence decisionmaking.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations