EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: isPartOf:"International Journal of Systems and Software Security and Protection (IJSSSP)"
Narrow search

Narrow search

Year of publication
Subject
All
Software Security 4 Cybersecurity 3 Curriculum 2 Security Engineering 2 Agile 1 Agile Software Development 1 Blended Learning Approach 1 Buffer Overflow 1 Challenges 1 Code Weakness 1 Core Knowledge Framework 1 Culture 1 Curricula Design 1 Cyber Resiliency 1 Cyber Supply Chain Risk Management (C-SCRM) 1 Cyber Workforce 1 Cyber-Physical Systems 1 Cyber-Supply Chain Risk Management 1 Department of Defense (DoD) 1 DevOps 1 DevOps Assessment 1 Domain Modeling 1 Dynamic Analysis 1 Education 1 Highly Regulated Environment 1 Information Technology 1 Input Validation 1 KSAs 1 Learning and Development 1 Literature Review 1 Mathematical Formalism 1 Memory Safety 1 Methodologies 1 Model Driven Architecture 1 National Initiative for Cybersecurity Education (NICE) 1 Quality 1 Risk Management 1 SDLC 1 Secure DevOps 1 Secure Software Development 1
more ... less ...
Online availability
All
Undetermined 10
Type of publication
All
Article 10
Language
All
English 10
Author
All
Albert, Michelle G. 1 Alradhi, Hasan M 1 Bird, David A 1 Boyens, Beatrix 1 Bronk, Chris 1 Chaim, Marcos Lordello 1 Cohen, Brian 1 Conklin, Art 1 Cruzes, Daniela Soares 1 Curry, John 1 Hubel, Martin S 1 Hyrynsalmi, Sami 1 Jabangwe, Ronald 1 Kuusinen, Kati 1 Leppänen, Ville 1 Lescisin, Michael 1 Mahmoud, Qusay H. 1 McDaniel, Elizabeth A. 1 Morales, Jose Andre 1 Nazaruka (Asnina), Erika 1 Nielsen, Niels Bonde 1 Osis, Janis 1 Riisom, Klaus R 1 Rindell, Kalle 1 Santos, Daniel Soares 1 Volkmann, Aaron 1 Yasar, Hasan 1
more ... less ...
Published in...
All
International Journal of Systems and Software Security and Protection (IJSSSP) 10
Source
All
Other ZBW resources 10
Showing 1 - 10 of 10
Cover Image
Challenges and Solutions for Addressing Software Security in Agile Software Development: A Literature Review and Rigor and Relevance Assessment
Jabangwe, Ronald; Kuusinen, Kati; Riisom, Klaus R; … - In: International Journal of Systems and Software Security … 9 (2018) 1, pp. 1-17
There has been a surge in the number of software security threats and vulnerabilities in recent times. At the same time, expectations towards software and data security are growing. Thus, there is a need to ensure that security-related tasks are effectively integrated in the software development...
Persistent link: https://www.econbiz.de/10012048197
Saved in:
Cover Image
Weaving Security into DevOps Practices in Highly Regulated Environments
Morales, Jose Andre; Yasar, Hasan; Volkmann, Aaron - In: International Journal of Systems and Software Security … 9 (2018) 1, pp. 18-46
In this article, the authors discuss enhancing a DevOps implementation in a highly regulated environment (HRE) with security principles. DevOps has become a standard option for entities seeking to streamline and increase participation by all stakeholders in their Software Development Lifecycle...
Persistent link: https://www.econbiz.de/10012048198
Saved in:
Cover Image
Fitting Security into Agile Software Development
Leppänen, Ville; Rindell, Kalle; Hyrynsalmi, Sami - In: International Journal of Systems and Software Security … 9 (2018) 1, pp. 47-70
Security objectives in software development are increasingly convergent with the business objectives, as requirements for privacy and the cost of security incidents call for more dependable software products. The development of secure software is accomplished by augmenting the software...
Persistent link: https://www.econbiz.de/10012048199
Saved in:
Cover Image
Opinions of the Software and Supply Chain Assurance Forum on Education, Training, and Certifications
Boyens, Beatrix - In: International Journal of Systems and Software Security … 9 (2018) 2, pp. 1-13
This article provides an overview of discussions held at the Software and Supply Chain Assurance (SSCA) forum held May 1-2, 2018, in McLean, Virginia. The two-day event focused on education and training for software assurance (SwA) and Cyber-Supply Chain Risk Management (C-SCRM). Attendees...
Persistent link: https://www.econbiz.de/10012048200
Saved in:
Cover Image
The Need for Higher Education in Cyber Supply Chain Security and Hardware Assurance
Cohen, Brian; Albert, Michelle G.; McDaniel, Elizabeth A. - In: International Journal of Systems and Software Security … 9 (2018) 2, pp. 14-27
Higher education curricula, specialized degrees, and certificate programs related to cybersecurity are proliferating in response to student demand; faculty interest and expertise; employer demand; government and industry standards and funding; and the expectations of specialized, state, or regional...
Persistent link: https://www.econbiz.de/10012048201
Saved in:
Cover Image
A Case for Using Blended Learning and Development Techniques to Aid the Delivery of a UK Cybersecurity Core Body of Knowledge
Bird, David A; Curry, John - In: International Journal of Systems and Software Security … 9 (2018) 2, pp. 28-45
This article explores the UK's current approach in addressing the cybersecurity skills gap championed by the National Cyber Security Strategy. There have been progressive and elaborate steps taken in the UK toward professionalization of the cybersecurity field. However, cybersecurity knowledge...
Persistent link: https://www.econbiz.de/10012048202
Saved in:
Cover Image
Enhancing a SCRM Curriculum With Cybersecurity
Conklin, Art; Bronk, Chris - In: International Journal of Systems and Software Security … 9 (2018) 2, pp. 46-56
Supply chain-related curricula exist across many universities, with many including risk management as an important or focal element. With the rise of software-driven technology across the supply chain, how can firms manage the inherent risks associated with software as part of a procurement...
Persistent link: https://www.econbiz.de/10012048203
Saved in:
Cover Image
What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability
Cruzes, Daniela Soares; Chaim, Marcos Lordello; Santos, … - In: International Journal of Systems and Software Security … 9 (2018) 3, pp. 1-33
Buffer overflow (BO) is a well-known and widely exploited security vulnerability. Despite the extensive body of research, BO is still a threat menacing security-critical applications. The authors present a comprehensive systematic review on techniques intended to detecting BO vulnerabilities...
Persistent link: https://www.econbiz.de/10012048204
Saved in:
Cover Image
Evaluation of Dynamic Analysis Tools for Software Security
Lescisin, Michael; Mahmoud, Qusay H. - In: International Journal of Systems and Software Security … 9 (2018) 3, pp. 34-59
This article discusses the development of secure software by means of dynamic analysis tools. A secure software-based system should have security checks and balances integrated throughout its entire development lifecycle, including its deployment phase. Therefore, this article covers both using...
Persistent link: https://www.econbiz.de/10012048205
Saved in:
Cover Image
Theory Driven Modeling as the Core of Software Development
Osis, Janis; Nazaruka (Asnina), Erika - In: International Journal of Systems and Software Security … 9 (2018) 3, pp. 60-77
Some experts opine that software is built in a primitive way. The role of modeling as a treatment for the weakness of software engineering became more important when the principles of Model Driven Architecture (MDA) appeared. Its main advantage is architectural separation of concerns. It showed...
Persistent link: https://www.econbiz.de/10012048206
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...