Author of the publication

Exploring Security Procedures in Secure Software Engineering: A Systematic Mapping Study.

, , and . EASE, page 433-439. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Green cloud computing adoption challenges and practices: a client's perspective-based empirical investigation., , , , , and . Cogn. Technol. Work., 25 (4): 427-446 (November 2023)Systematic Mapping Study on Security Approaches in Secure Software Engineering., , , and . IEEE Access, (2021)Security Assurance Model of Software Development for Global Software Development Vendors., , , and . IEEE Access, (2022)Change Management in Cloud-Based Offshore Software Development: A Researchers Perspective., , , , and . PROFES, volume 13709 of Lecture Notes in Computer Science, page 243-251. Springer, (2022)Systematic Literature Review on Security Risks and its Practices in Secure Software Development., , , and . IEEE Access, (2022)Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach., , , and . Secur. Commun. Networks, (2021)A preliminary structure of software security assurance model., and . ICGSE, page 137-140. ACM, (2018)The State of the Art on Secure Software Engineering: A Systematic Mapping Study., , , and . EASE, page 487-492. ACM, (2020)An Evaluation Framework for Communication and Coordination Processes in Offshore Software Development Outsourcing Relationship: Using Fuzzy Methods., , , , , , , , and . IEEE Access, (2019)Security risks of global software development life cycle: Industry practitioner's perspective., , , and . J. Softw. Evol. Process., (March 2024)