Open Access
Issue
EPJ Web Conf.
Volume 328, 2025
First International Conference on Engineering and Technology for a Sustainable Future (ICETSF-2025)
Article Number 01046
Number of page(s) 11
DOI https://doi.org/10.1051/epjconf/202532801046
Published online 18 June 2025
  1. A. Van Rensburg, S.H. Von Solms, Vulnerability testing in the development cycle, in Proceedings of the 2017 IST-Africa Week Conference (IST-Africa), 1-10 (2017) [Google Scholar]
  2. S.J. Chen, Y.C. Pan, Y.W. Ma, C.M. Chiang, The impact of the practical security test during the software development lifecycle, in Proceedings of the 2022 24th International Conference on Advanced Communication Technology (ICACT), 313-316 (2022) [CrossRef] [Google Scholar]
  3. R.A. Khan, S.U. Khan, H.U. Khan, M. Ilyas, Systematic literature review on security risks and its practices in secure software development, IEEE Access, 10, 5456-5481 (2022) [Google Scholar]
  4. P. Kadebu, V. Thada, P. Chiurunge, Security requirements extraction and classification: a survey, in Proceedings of the 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), 129-134 (2018) [Google Scholar]
  5. M. Shaikh, P.H.A. Qureshi, M. Shaikh, Q.A. Arain, A. Zubedi, P. Shaikh, Security paradigms in SDLC requirement phase—A comparative analysis approach, in Proceedings of the 2021 International Conference on Engineering and Emerging Technologies (ICEET), 1-6 (2021) [Google Scholar]
  6. M. Ruggieri, T.T. Hsu, M.L. Ali, Security considerations for the development of secure software systems, in Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 1187-1193 (2019) [Google Scholar]
  7. A.M. Fernandes, A. Pai, L.M.M. Colaco, Secure SDLC for IoT based health monitor, in Proceedings of the 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), 1236-1241 (2018) [Google Scholar]
  8. M.B. Freitas, V.M. Araüjo, J.P. Magalhàes, Process SDLC-GDPR: towards the development of secure and compliant applications, in Proceedings of the 2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC), 1-6 (2023) [Google Scholar]
  9. K. Qian, R.M. Parizi, D. Lo, Owasp risk analysis driven security requirements specification for secure android mobile software development, in Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-2 (2018) [Google Scholar]
  10. S.A. Altayaran, W. Elmedany, Integrating web application security penetration testing into the software development life cycle: a systematic literature review, in Proceedings of the 2021 International Conference on Data Analytics for Business and Industry (ICDABI), 671-676 (2021) [CrossRef] [Google Scholar]
  11. V. Aishwarya, S. Pediredla, B. Radhika, B. Vasanthi, A.K. Velmurugan et al., Incorporating of security methods into the software development lifecycle process (SDLC), in Proceedings of the 2023 International Conference on Computer Communication and Informatics (ICCCI), 1-4 (2023) [Google Scholar]
  12. J. Whitmore, W. Tobin, Improving attention to security in software design with analytics and cognitive techniques, 2017 IEEE Cybersecurity Development (SecDev), 16-21 (2017) [CrossRef] [Google Scholar]
  13. M. Marandi, A. Bertia, S. Silas, Implementing and automating security scanning to a devsecops ci/cd pipeline, in Proceedings of the 2023 World Conference on Communication & Computing (WCONF), 1-6 (2023) [Google Scholar]
  14. F. Alghamdi, N. Hamza, M. Tamimi, Factors that influence the adoption of information security on requirement phase for custom-made software at SMEs, in Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), 1-6 (2019) [Google Scholar]
  15. T. Rangnau, R.V. Buijtenen, F. Fransen, F. Turkmen, Continuous security testing: A case study on integrating dynamic security testing tools in ci/cd pipelines, in Proceedings of the 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC), 145-154 (2020) [Google Scholar]
  16. G. Raj, D. Singh, A. Bansal, Analysis for security implementation in SDLC, in Proceedings of the 2014 5th International Conference-Confluence The Next Generation Information Technology Summit (Confluence), 221-226 (2014) [CrossRef] [Google Scholar]
  17. Y. Valdés-Rodriguez, J. Hochstetter-Diez, M. Diéguez-Rebolledo, A. Bustamante-Mora, R. Cadena-Martinez, Analysis of strategies for the integration of security practices in agile software development: A sustainable SME approach, IEEE Access (2024) [Google Scholar]
  18. S.Z. Hlaing, K. Ochimizu, An integrated cost-effective security requirement engineering process in SDLC using FRAM, in Proceedings of the 2018 International Conference on Computational Science and Computational Intelligence (CSCI), 852-857 (2018) [CrossRef] [Google Scholar]
  19. M.M. Jakeri, M.F. Hassan, A review of factors influencing the implementation of secure framework for in-house web application development in Malaysian public sector, in Proceedings of the 2018 IEEE Conference on Application, Information and Network Security (AINS), 99-104 (2018) [CrossRef] [Google Scholar]
  20. Y. Shestak, S. Toliupa, A. Torchylo, O.J. Onyigwang, Minimization of information losses in data centers as one of the priority areas of information security technologies, in Proceedings of the 2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S & T), 227-230 (2022) [Google Scholar]
  21. A. Shrestha, T. Sharma, P. Saha, S.I. Ahmed, M.N. Al-Ameen, A first look into software security practices in Bangladesh, ACM J. Comput. Sustain. Soc., 1(1), Article 8, 1-24 (2023) [CrossRef] [Google Scholar]
  22. F. Chowdhury, An application-centric survey of security and privacy issues: Bangladesh perspective, International Journal of Computer Applications, 175(38), 1-8 (2020) [CrossRef] [Google Scholar]
  23. M.S. Sadekin, M.A.H. Shaikh, Security of E-Banking in Bangladesh, Journal of Finance and Accounting, 4(1), 1-8 (2016) [CrossRef] [Google Scholar]
  24. A.A. Ardo, J.M. Bass, T. Gaber, Implications of regulatory policy for building secure agile software in Nigeria: A grounded theory, The Electronic Journal of Information Systems in Developing Countries, 89(6), e12285 (2023) [CrossRef] [Google Scholar]
  25. C.A. Hossain, M.A. Mohamed, M.S.R. Zishan, R. Ahasan, S.M. Sharun, Enhancing the security of E-Health services in Bangladesh using blockchain technology, International Journal of Information Technology, 14(3), 1179-1185 (2022) [CrossRef] [PubMed] [Google Scholar]
  26. M. Shafir, P.P. Saha, A.T. Araf, J.F. Nishi, M. Hasan, F. Sadia, The success factors of agile methodologies in software development based on developing countries' software firms, Procedia Comput. Sci. 256, 1954-1961 (2025). [CrossRef] [Google Scholar]
  27. M. Shafir, P. Saha, A. Araf, S. Haque, M. Hasan, F. Sadia, M. Rokonuzzaman, Influential factors of software firms' performance in the industry of developing countries, in Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering (2024), pp. 547-554. [CrossRef] [Google Scholar]
  28. S.A. Lesum, S.R. Akthar, M.R. Islam, F. Sadia, M. Hasan, Project governance to improve the performance of software projects by mitigating the software risk factors: The moderating role of project leadership, Procedia Comput. Sci. 239, 1863-1870 (2024). [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.