Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software [PDF]
Purpose – This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong ...
Joe Garcia +5 more
doaj +1 more source
Monitoring solution for cloud-native DevSecOps [PDF]
Software development and operations are increasingly adopting cloud-native environments. The popularity of development practices such as DevSecOps is one of the reasons for this change.
Kuvaja, Pasi, Rajan, Ranjit, Sojan, Arun
core +1 more source
Critical success factors for integrating security into a DevOps environment [PDF]
Integrating security into a DevOps environment, also known as DevSecOps, can allow organisations to deliver more secure applications and services faster to market.
de Kock, Jacques, Ophoff, Jacques
core +5 more sources
ВИКОРИСТАННЯ ПІДХОДУ DEVSECOPS ДЛЯ АНАЛІЗУ СУЧАСНИХ ЗАГРОЗ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ
У даній статті подано дослідження використання підходу DevSecOps для аналізу сучасних загроз. Визначення методології для реалізації та адаптації DevSecOps підходу.
Vitalii Susukailo
doaj +1 more source
DevOps: Is there a gap between education and industry?
Highlights Global survey on prevalence of DevOps practices in Education and Industry. Some traditional agile practices are also found in plan‐driven management. Technological gaps have been found between industry and academia. Academic and Industry staff have an objective perception of DevOps maturity. Abstract DevOps has been identified by industry as
Miguel Ángel Sánchez‐Cifo +2 more
wiley +1 more source
INTEGRACIÓN Y DESPLIEGUE CONTINUO CON DEVOPS COMO CULTURA EN EMPRESAS DEL SECTOR TI COLOMBIANAS
Continuous integration and deployment are practices that have allowed the software development cycle to behave in amore agile way, thanks to the fact that they constantly provide the possibility of automating processes in order to improvetimes and ...
Gilberth Nick Cruz González +1 more
doaj +1 more source
Implications of regulatory policy for building secure agile software in Nigeria: A grounded theory
Abstract Nigeria is ranked second worldwide, after India, in reported incidences of cyberattacks. Attackers usually exploit vulnerabilities in software which may not have adequately considered security features during the development process. Agile methods have the potential to increase productivity and ensure faster delivery of software, although they
Abdulhamid A. Ardo +2 more
wiley +1 more source
Context-Aware Software Vulnerability Classification Using Machine Learning
Managing the vulnerabilities reported by a number of security scanning software is a tedious and time-consuming task, especially in large-scale, modern communication networks.
Grzegorz Siewruk, Wojciech Mazurczyk
doaj +1 more source
Improving test automation maturity: A multivocal literature review
This paper reviewed 81 primary studies (26 academic literature and 55 grey literature sources). It extracted 26 test automation best practices (e.g., define an effective test automation strategy, set up good test environments, and develop high‐quality test scripts) and collected many pieces of advice (e.g., in forms of implementation/improvement ...
Yuqing Wang +4 more
wiley +1 more source
From statistical‐ to machine learning‐based network traffic prediction
In this paper, we provide a study on the existing NTP techniques through reviewing,investigating, and classifying the recent relevant works conducted in this field. We classify the NTP techniques based on statistical‐, ML‐based, and hybrid techniques. Additionally, we discuss the existing challenges and future directions of NTP showing that how ML and ...
Iraj Lohrasbinasab +3 more
wiley +1 more source

