Zobrazeno 1 - 10
of 117
pro vyhledávání: '"Mahmood Niazi"'
Autor:
Habib Ullah Khan, Mahmood Niazi, Mohamed El-Attar, Naveed Ikram, Siffat Ullah Khan, Asif Qumer Gill
Publikováno v:
IEEE Access, Vol 9, Pp 93593-93613 (2021)
There is a need to identify requirements engineering (RE) practices that are important to global software development (GSD) project success. The objective of this paper is to report our recent empirical study results which aimed to identify the RE pr
Externí odkaz:
https://doaj.org/article/adb83912c6304f029d949448ecb3ea78
Publikováno v:
Applied Sciences, Vol 13, Iss 4, p 2465 (2023)
Global software development (GSD) is rapidly becoming standard practice in the software industry due to its many potential benefits. However, one of the biggest challenges in GSD projects is to explicitly include security in the different phases of t
Externí odkaz:
https://doaj.org/article/d679d05a057e4e9ebdccb0ce6f2cc24a
Publikováno v:
IEEE Access, Vol 8, Pp 62738-62761 (2020)
A sequence diagram is a modeling approach for visualizing the behavioral execution of a system. The objective of this research is to investigate the problem of security in a behavioral model (sequence diagram) through the application of model refacto
Externí odkaz:
https://doaj.org/article/8b529d40b79f47e395e275f4ad1e365b
Publikováno v:
IEEE Access, Vol 8, Pp 215758-215776 (2020)
Security is one of the most important software quality attributes. Software security is about designing and developing secure software that does not allow the integrity, confidentiality, and availability of its code, data, or service to be compromise
Externí odkaz:
https://doaj.org/article/f5a0c7c22fd14b9a91494e2b3073abd4
Publikováno v:
IEEE Access, Vol 8, Pp 152316-152332 (2020)
Security has become a vital factor for any Internet of things network but it is of paramount importance for Internet of Health Things (IoHT). IoHT also known as Internet of Medical Things (IoMT) is integration of IoT and healthcare environment, where
Externí odkaz:
https://doaj.org/article/625f4a505dee4dc89f5d94f8d2ac3531
Autor:
Mamoona Humayun, Mahmood Niazi, Maram Fahhad Almufareh, N. Z. Jhanjhi, Sajjad Mahmood, Mohammad Alshayeb
Publikováno v:
Applied Sciences, Vol 12, Iss 8, p 3953 (2022)
Cloud computing (CC) is the delivery of computing services on demand and is charged using a “pay per you use” policy. Of the multiple services offered by CC, SaaS is the most popular and widely adapted service platform and is used by billions of
Externí odkaz:
https://doaj.org/article/862c17c009af4c4e98d00881bce63356
Publikováno v:
IEEE Access, Vol 6, Pp 28611-28631 (2018)
The focus on secure software development has been growing steadily in all phases of the software development life cycle. Security awareness in the requirements engineering stage of software development is important in building secure software. One of
Externí odkaz:
https://doaj.org/article/6ae23f6075004739ac9d74d117163650
Publikováno v:
IEEE Access, Vol 6, Pp 41643-41675 (2018)
There is a significant need to give more careful consideration to the process and product quality assurance (PPQA) process area of the capability maturity model integration (CMMI) Level 2, especially in the context of smalland medium-sized software d
Externí odkaz:
https://doaj.org/article/87730905debb4a66a4ff61a9c7572386
Publikováno v:
IEEE Access, Vol 5, Pp 24162-24183 (2017)
There is a significant need to give careful consideration to Capability Maturity Model Integration (CMMI) Level 2 specific practices-SP 1.3 “manage requirements changes,”and SP 1.4 “maintain bidirectional traceability of requirements,”especia
Externí odkaz:
https://doaj.org/article/a57b9dd38193430cbf833b6e2dbeda6f
Publikováno v:
Software: Practice and Experience. 53:1013-1035