skip to main content
Volume 36, Issue 12December 2024Current Issue
Reflects downloads up to 31 Dec 2024Bibliometrics
Skip Table Of Content Section
front-matter
Issue Information

No abstract is available for this article.

research-article
Open Access
Evolution of secure development lifecycles and maturity models in the context of hosted solutions
Abstract

Organizations creating software commonly utilize software development lifecycles (SDLCs) to structure development activities. Secure development lifecycles (SDLs) integrate into SDLCs, adding security or compliance activities. They are widely ...

This paper analyzes how well historic and current secure development lifecycles and security maturity models support hosted solutions, by creating a comparison framework base on the MS‐SDL, Touchpoints, SAMM2, DSOMM, CSDL, and SDL2 and performing an ...

research-article
SGDL: Smart contract vulnerability generation via deep learning
Abstract

The growing popularity of smart contracts in various areas, such as digital payments and the Internet of Things, has led to an increase in smart contract security challenges. Researchers have responded by developing vulnerability detection ...

image image

research-article
Aligning technical knowledge to an industry domain in global software development: A systematic mapping
Abstract

Finding software developers with expertise in specific technologies that align with industry domains is an increasingly critical requirement. However, due to the ever‐changing nature of the technology industry, locating these professionals has ...

This study addresses the challenge of finding software developers with domain‐specific expertise in the rapidly evolving technology industry. By reviewing 1,251 studies and selecting 21 for in‐depth analysis, the research highlights current trends and ...

research-article
Unveiling the impact of unchanged modules across versions on the evaluation of within‐project defect prediction models
Abstract Background

Software defect prediction (SDP) is a topic actively researched in the software engineering community. Within‐project defect prediction (WPDP) involves using labeled modules from previous versions of the same project to train ...

We provide a method to detect and remove duplicate modules from defect datasets and unveil the impact of data duplication in WPDP on model evaluation. The experiments provide evidence that data duplication significantly affects the reported performance ...

research-article
Selection of agile project management approaches based on project complexity
Abstract

Managing software development projects is a complex endeavor due to the constant emergence of unforeseen events that deviate from initial expectations. A competent project leader is not just someone who follows the planned course but also adept ...

In this article, we provide a guide for selecting the most suitable strategies, techniques, and tools for agile project management. The project's complexity is determined based on the fixed elements of the triple constraint and the factors that have the ...

research-article
Identification and prioritization of the challenges faced by vendor organizations in the shape of cyber security: A FUZZY‐AHP ‐based systematic approach
Abstract

The goal of this research study was to identify and prioritize the significant cybersecurity challenges that vendor firms encounter during software development. Using Systematic Literature Reviews (SLRs), 13 significant challenges were found, ...

FIGURE 4. List/Detail of identified Cyber Security Challenges. image image

research-article
IABC‐TCG: Improved artificial bee colony algorithm‐based test case generation for smart contracts
Abstract

With the widespread application of smart contracts, there is a growing concern over the quality assurance of smart contracts. The data flow testing is an important technology to ensure the correctness of smart contracts. We propose an approach ...

We propose IABC‐TCG (Improved Artificial Bee Colony‐Test Case Generation) to generate test cases for the data flow testing of smart contracts. The improved ABC (Artificial Bee Colony) algorithm is applied to generate test cases, in which a dominance ...

research-article
Open Access
On the importance of CI/CD practices for database applications
Summary

Continuous integration and continuous delivery (CI/CD) automate software integration and reduce repetitive engineering work. While the use of CI/CD presents efficiency gains, in database application development, this potential has not been fully ...

While the use of continuous integration and continuous delivery (CI/CD) presents efficiency gains, in database application development, this potential has not been fully exploited. We explore the state of the art in this area, with a focus on current ...

research-article
Open Access
Organizing Graphical User Interface tests from behavior‐driven development as videos to obtain stakeholders' feedback
Abstract

Demonstrating software early and responding to feedback is crucial in agile development. However, it is difficult for stakeholders who are not on‐site customers but end users, marketing people, or designers, and so forth to give feedback in an ...

Videos of GUI tests are organized in a connection graph (left graph). In a review meeting, videos are selected (gray rectangles in the connection graph) and replayed in a video viewer (right graph), where test step information is also available. image ...

Comments