Results 51 to 60 of about 2,003 (206)

Cyber oriented digital engineering

open access: yesSystems Engineering, Volume 27, Issue 1, Page 109-119, January 2024.
Abstract The purpose of cyber oriented digital engineering (CODE) is to provide a repeatable systems‐engineering process for systems to resist Stuxnet‐class advanced persistent threat (APT) cyberattacks. CODE integrates cyber thinking with systems thinking.
Joseph Mitola III, Mark Prys
wiley   +1 more source

Evolution of DevSecOps and Its Influence on Application Security: A Systematic Literature Review

open access: yesTechnologies
This systematic literature review (SLR) investigates the current landscape of DevSecOps by analysing peer-reviewed studies published between 2012 and 2025.
Khwaja Imran Mohammed   +2 more
doaj   +1 more source

A role theory perspective: Will shifting left become a pain for application developers? [PDF]

open access: yes, 2022
To foster application security (AppSec), organizations are adopting development, security, and operations (DevSecOps) framework that integrates application development with security controls and systems operations. With DevSecOps.
D\u27Arcy, John, Kam, Hwee-Joo
core   +1 more source

An Efficient Ontology‐Based Semantic Interoperability Using MSGO‐RNN in Cloud Computing

open access: yesJournal of Optimization, Volume 2024, Issue 1, 2024.
Semantic interoperability (SI) is defined as the capability of interpreting the nature of the information exchanged inside cloud computing (CC). For SI, ontology is selected as a solution. A hierarchical structure is offered by an ontology that comprises semantic relations between the application and the cloud server (CS). Even though different methods
Chithambaramani R.   +4 more
wiley   +1 more source

Evolution of Integration, Build, Test, and Release Engineering Into DevOps and to DevSecOps [PDF]

open access: yes, 2020
Software engineering operations in large organizations are primarily comprised of integrating code from multiple branches, building, testing the build, and releasing it.
A.Wiedemann, F. M. A.Erich, J.Cito
core   +2 more sources

Mitigating Software Vulnerabilities through Secure Software Development with a Policy‐Driven Waterfall Model

open access: yesJournal of Engineering, Volume 2024, Issue 1, 2024.
For the past few years, software security has become a pressing issue that needs to be addressed during software development. In practice, software security is considered after the deployment of software rather than considered as an initial requirement.
Shariq Hussain   +7 more
wiley   +1 more source

ANALYSIS AND MINIMIZATION OF THE RISKS OF HARMFUL DEPENDENCIES IN THE PROCESS OF CONTINUOUS INTEGRATION AND IMPLEMENTATION OF SOFTWARE CODE

open access: yesInternational Journal of Advanced Studies
Continuous integration and continuous deployment (CI/CD) processes have become essential elements of modern software development, enabling automation and optimization of work processes.
Danil N. Alekseev, Renat M. Khamitov
doaj   +1 more source

Continuous Security Testing:A Case Study on Integrating Dynamic Security Testing Tools in CI/CD Pipelines [PDF]

open access: yes, 2020
Continuous Integration (CI) and Continuous Delivery (CD) have become a well-known practice in DevOps to ensure fast delivery of new features. This is achieved by automatically testing and releasing new software versions, e.g.
Buijtenen, Remco v.   +3 more
core   +1 more source

Self-Service Cybersecurity Monitoring as Enabler for DevSecOps

open access: yesIEEE Access, 2019
Current IoT systems are highly distributed systems that integrate cloud, edge, and fog computing approaches depending on where intelligence and processing capabilities are allocated.
Jessica Diaz   +4 more
doaj   +1 more source

Towards People Maturity for Secure Development and Operations: A vision [PDF]

open access: yes
DevOps (development and operations) is a set of collaborative practices that automate continuous delivery of new software versions with an aim to reduce the development life cycle and produce quality software products.
Akbar, Muhammad Azeem   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy