Issue Information
No abstract is available for this article.
Evolution of secure development lifecycles and maturity models in the context of hosted solutions
Organizations creating software commonly utilize software development lifecycles (SDLCs) to structure development activities. Secure development lifecycles (SDLs) integrate into SDLCs, adding security or compliance activities. They are widely ...
This paper analyzes how well historic and current secure development lifecycles and security maturity models support hosted solutions, by creating a comparison framework base on the MS‐SDL, Touchpoints, SAMM2, DSOMM, CSDL, and SDL2 and performing an ...
SGDL: Smart contract vulnerability generation via deep learning
The growing popularity of smart contracts in various areas, such as digital payments and the Internet of Things, has led to an increase in smart contract security challenges. Researchers have responded by developing vulnerability detection ...
image image
Aligning technical knowledge to an industry domain in global software development: A systematic mapping
Finding software developers with expertise in specific technologies that align with industry domains is an increasingly critical requirement. However, due to the ever‐changing nature of the technology industry, locating these professionals has ...
This study addresses the challenge of finding software developers with domain‐specific expertise in the rapidly evolving technology industry. By reviewing 1,251 studies and selecting 21 for in‐depth analysis, the research highlights current trends and ...
Unveiling the impact of unchanged modules across versions on the evaluation of within‐project defect prediction models
Software defect prediction (SDP) is a topic actively researched in the software engineering community. Within‐project defect prediction (WPDP) involves using labeled modules from previous versions of the same project to train ...
We provide a method to detect and remove duplicate modules from defect datasets and unveil the impact of data duplication in WPDP on model evaluation. The experiments provide evidence that data duplication significantly affects the reported performance ...
Selection of agile project management approaches based on project complexity
Managing software development projects is a complex endeavor due to the constant emergence of unforeseen events that deviate from initial expectations. A competent project leader is not just someone who follows the planned course but also adept ...
In this article, we provide a guide for selecting the most suitable strategies, techniques, and tools for agile project management. The project's complexity is determined based on the fixed elements of the triple constraint and the factors that have the ...
Identification and prioritization of the challenges faced by vendor organizations in the shape of cyber security: A FUZZY‐AHP ‐based systematic approach
The goal of this research study was to identify and prioritize the significant cybersecurity challenges that vendor firms encounter during software development. Using Systematic Literature Reviews (SLRs), 13 significant challenges were found, ...
FIGURE 4. List/Detail of identified Cyber Security Challenges. image image
IABC‐TCG: Improved artificial bee colony algorithm‐based test case generation for smart contracts
With the widespread application of smart contracts, there is a growing concern over the quality assurance of smart contracts. The data flow testing is an important technology to ensure the correctness of smart contracts. We propose an approach ...
We propose IABC‐TCG (Improved Artificial Bee Colony‐Test Case Generation) to generate test cases for the data flow testing of smart contracts. The improved ABC (Artificial Bee Colony) algorithm is applied to generate test cases, in which a dominance ...
On the importance of CI/CD practices for database applications
Continuous integration and continuous delivery (CI/CD) automate software integration and reduce repetitive engineering work. While the use of CI/CD presents efficiency gains, in database application development, this potential has not been fully ...
While the use of continuous integration and continuous delivery (CI/CD) presents efficiency gains, in database application development, this potential has not been fully exploited. We explore the state of the art in this area, with a focus on current ...
Organizing Graphical User Interface tests from behavior‐driven development as videos to obtain stakeholders' feedback
Demonstrating software early and responding to feedback is crucial in agile development. However, it is difficult for stakeholders who are not on‐site customers but end users, marketing people, or designers, and so forth to give feedback in an ...
Videos of GUI tests are organized in a connection graph (left graph). In a review meeting, videos are selected (gray rectangles in the connection graph) and replayed in a video viewer (right graph), where test step information is also available. image ...