A SWOT Analysis of Software Development Life Cycle Security Metrics
ABSTRACT Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development of information and communication technologies (ICT), the widespread usage of software systems has transformed modern society in many ways bu...
Saved in:
Published in | Journal of software : evolution and process Vol. 37; no. 1 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Chichester
Wiley Subscription Services, Inc
01.01.2025
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | ABSTRACT
Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development of information and communication technologies (ICT), the widespread usage of software systems has transformed modern society in many ways but also created new issues in protecting confidential and sensitive information. The quantification of security measures can provide evidence to support decision‐making in software security, particularly when assessing the security performance of software systems. This entails understanding the key quality criteria of security metrics, which can assist in constructing security models aligned with practical requirements. To delve deeper into this subject, the current study conducted a systematic literature review (SLR) on security metrics and measures within the realm of secure software development (SSD). The study selected 61 research publications for data extraction based on the specific inclusion and exclusion criteria. The study identified 215 software security metrics and classified them into different phases of software development life cycle (SDLC). In order to evaluate the most cited metrics in each phase of SDLC, the strengths, weaknesses, opportunities, and threats (SWOT) analysis was performed. The SWOT analysis offers a structured framework enabling researchers to make more effective, well‐informed decisions and mitigate potential risks, ultimately contributing to more valuable research findings. The study's findings provide researchers guidance for exploring emerging trends and addressing existing gaps in SDLC. This study also provides software professionals with a more comprehensive understanding of security measurements, constraints, and open‐ended specific and general issues.
This paper presents a comprehensive SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis of security metrics applied within the Software Development Life Cycle (SDLC). By evaluating key metrics such as secure testing, implementation, design, and maintenance, the study identifies their strengths in enhancing software resilience and highlights gaps in under‐prioritized areas like secure maintenance. Opportunities for integrating advanced tools and frameworks are discussed, alongside emerging threats posed by evolving cybersecurity challenges. The findings offer actionable insights for optimizing the use of security metrics across the SDLC to strengthen overall software security |
---|---|
AbstractList | Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development of information and communication technologies (ICT), the widespread usage of software systems has transformed modern society in many ways but also created new issues in protecting confidential and sensitive information. The quantification of security measures can provide evidence to support decision‐making in software security, particularly when assessing the security performance of software systems. This entails understanding the key quality criteria of security metrics, which can assist in constructing security models aligned with practical requirements. To delve deeper into this subject, the current study conducted a systematic literature review (SLR) on security metrics and measures within the realm of secure software development (SSD). The study selected 61 research publications for data extraction based on the specific inclusion and exclusion criteria. The study identified 215 software security metrics and classified them into different phases of software development life cycle (SDLC). In order to evaluate the most cited metrics in each phase of SDLC, the strengths, weaknesses, opportunities, and threats (SWOT) analysis was performed. The SWOT analysis offers a structured framework enabling researchers to make more effective, well‐informed decisions and mitigate potential risks, ultimately contributing to more valuable research findings. The study's findings provide researchers guidance for exploring emerging trends and addressing existing gaps in SDLC. This study also provides software professionals with a more comprehensive understanding of security measurements, constraints, and open‐ended specific and general issues. ABSTRACT Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development of information and communication technologies (ICT), the widespread usage of software systems has transformed modern society in many ways but also created new issues in protecting confidential and sensitive information. The quantification of security measures can provide evidence to support decision‐making in software security, particularly when assessing the security performance of software systems. This entails understanding the key quality criteria of security metrics, which can assist in constructing security models aligned with practical requirements. To delve deeper into this subject, the current study conducted a systematic literature review (SLR) on security metrics and measures within the realm of secure software development (SSD). The study selected 61 research publications for data extraction based on the specific inclusion and exclusion criteria. The study identified 215 software security metrics and classified them into different phases of software development life cycle (SDLC). In order to evaluate the most cited metrics in each phase of SDLC, the strengths, weaknesses, opportunities, and threats (SWOT) analysis was performed. The SWOT analysis offers a structured framework enabling researchers to make more effective, well‐informed decisions and mitigate potential risks, ultimately contributing to more valuable research findings. The study's findings provide researchers guidance for exploring emerging trends and addressing existing gaps in SDLC. This study also provides software professionals with a more comprehensive understanding of security measurements, constraints, and open‐ended specific and general issues. This paper presents a comprehensive SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis of security metrics applied within the Software Development Life Cycle (SDLC). By evaluating key metrics such as secure testing, implementation, design, and maintenance, the study identifies their strengths in enhancing software resilience and highlights gaps in under‐prioritized areas like secure maintenance. Opportunities for integrating advanced tools and frameworks are discussed, alongside emerging threats posed by evolving cybersecurity challenges. The findings offer actionable insights for optimizing the use of security metrics across the SDLC to strengthen overall software security |
Author | Raza, Mushtaq Rahman, Hanif Ur Khan, Rafiq Ahmad Mohmand, Muhammad Ismail Khalid, Ayesha Afsar, Palwasha |
Author_xml | – sequence: 1 givenname: Ayesha surname: Khalid fullname: Khalid, Ayesha organization: Abdul Wali Khan University – sequence: 2 givenname: Mushtaq surname: Raza fullname: Raza, Mushtaq organization: Abdul Wali Khan University – sequence: 3 givenname: Palwasha surname: Afsar fullname: Afsar, Palwasha organization: Abdul Wali Khan University – sequence: 4 givenname: Rafiq Ahmad orcidid: 0000-0002-5983-9981 surname: Khan fullname: Khan, Rafiq Ahmad email: rafiqahmadk@gmail.com organization: University of Malakand – sequence: 5 givenname: Muhammad Ismail surname: Mohmand fullname: Mohmand, Muhammad Ismail organization: Sarhad University of Information Technology SUIT – sequence: 6 givenname: Hanif Ur orcidid: 0000-0001-6012-6199 surname: Rahman fullname: Rahman, Hanif Ur organization: Khyber Pakhtunkhwa (KPK) |
BookMark | eNp10E1Lw0AQBuBFKlhrwZ-w4MVL6n5mk2OJVoWWgql4XNLNLKSk2bibWvLvTa14cy4zAw_D8F6jUeMaQOiWkhklhD2EvZ8xJcQFGjMiVKREQkd_s-JXaBrCjgwVMyKFHKNsjvOP9QbPm6LuQxWwszh3tjsWHvAjfEHt2j00HV5WFnDWmxpwDubgq67HK-h8ZcINurRFHWD62yfoffG0yV6i5fr5NZsvI8OkEJFSSalSSdOtKNk25taKLSmIpSlNE8mNSYfNWKFKRWNISi44E4bYgpVJSkrgE3R3vtt693mA0OmdO_jh8aA5jQmnUko1qPuzMt6F4MHq1lf7wveaEn1KSQ8p6VNKA43O9FjV0P_rdL56-_HfhMRoIg |
Cites_doi | 10.1109/THS.2008.4534520 10.1016/j.chb.2023.108109 10.1109/WCSE.2010.104 10.1109/ICST.2009.36 10.1109/SERE-C.2014.17 10.1016/j.csi.2010.01.006 10.4018/978-1-5225-6313-6.ch002 10.1145/1071021.1071046 10.1007/11751595_106 10.1007/978-3-642-11747-3_5 10.1109/ESEM.2009.5314220 10.1016/j.dcan.2019.01.005 10.1109/SEAA51224.2020.00073 10.1109/NetCoM.2009.77 10.1145/2108144.2108154 10.1049/sfw2.12051 10.5120/1184-1638 10.1145/3234152.3234187 10.1145/1370905.1370913 10.1109/ICSE.2013.6606612 10.1109/ESEM.2009.5314213 10.1016/j.infsof.2008.12.005 10.1109/ESEM.2009.5314215 10.1016/j.istr.2013.02.002 10.1016/j.infsof.2008.09.009 10.1016/j.infsof.2014.09.001 10.1145/1852786.1852798 10.7763/LNSE.2016.V4.239 10.1109/ISA.2008.104 10.1002/smr.2521 10.1016/j.cose.2006.10.002 10.1109/ARES.2012.33 10.1109/HASE.2014.10 10.1109/ESEM.2013.19 10.1109/ACCESS.2020.2971712 10.1145/1456362.1456370 10.1109/ACCESS.2022.3140181 10.1016/j.infsof.2018.05.011 10.1002/smr.2464 10.1145/2810103.2813604 10.1145/1842752.1842787 10.5120/ijais2017451710 10.1109/QSIC.2011.31 10.1109/ICST.2010.32 10.1109/ISIAS.2013.6947732 10.1109/ACCESS.2020.3029501 10.1145/3339252.3339263 10.1145/1774088.1774504 10.1109/MINES.2011.27 10.1109/ICSE.2012.6227096 10.1109/ARES.2009.130 10.1186/s40411‐018‐0046‐4 10.1007/978-3-642-40779-6_23 10.11648/j.ajsea.20130206.14 10.1109/TSE.2010.81 10.1016/j.jss.2011.08.013 10.1002/smr.2303 10.1145/3383219.3383290 10.1145/3230833.3233274 10.1002/smr.2457 |
ContentType | Journal Article |
Copyright | 2024 John Wiley & Sons Ltd. 2025 John Wiley & Sons, Ltd. |
Copyright_xml | – notice: 2024 John Wiley & Sons Ltd. – notice: 2025 John Wiley & Sons, Ltd. |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1002/smr.2744 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | CrossRef Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2047-7481 |
EndPage | n/a |
ExternalDocumentID | 10_1002_smr_2744 SMR2744 |
Genre | article |
GroupedDBID | .3N .4S .GA .Y3 05W 0R~ 10A 1OB 1OC 31~ 33P 3SF 50Z 52O 52U 8-0 8-1 8-3 8-4 8-5 930 A03 AAESR AAEVG AAHQN AAMNL AANHP AANLZ AAONW AASGY AAXRX AAYCA AAZKR ABCUV ABPVW ACAHQ ACBWZ ACCZN ACPOU ACRPL ACXBN ACXQS ACYXJ ADBBV ADEOM ADIZJ ADKYN ADMGS ADMLS ADNMO ADOZA ADXAS ADZMN AEIGN AEIMD AEUYR AEYWJ AFBPY AFFPM AFGKR AFWVQ AFZJQ AGHNM AGQPQ AGYGG AHBTC AITYG AIURR AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ARCSS ATUGU AUFTA AZBYB AZFZN BAFTC BDRZF BHBCM BMNLL BMXJE BRXPI BY8 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM EBS EDO EJD F00 F01 F04 G-S G.N GODZA HGLYW HZ~ I-F LATKE LEEKS LH4 LITHE LOXES LUTES LW6 LYRES MEWTI MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 O66 O9- P2W P2X PQQKQ Q.N Q11 QB0 R.K ROL SUPJJ TUS W8V W99 WBKPD WIH WIK WOHZO WXSBR WYISQ WZISG ~WT AAHHS AAYXX ACCFJ AEEZP AEQDE AIWBW AJBDE CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c2544-778d79519b4d2b63ff4b0a0f1919853cc90a0cf47d716e8d34324c0fa2d890de3 |
IEDL.DBID | DR2 |
ISSN | 2047-7473 |
IngestDate | Wed Aug 13 10:44:11 EDT 2025 Tue Jul 01 01:44:45 EDT 2025 Wed Aug 20 07:26:39 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c2544-778d79519b4d2b63ff4b0a0f1919853cc90a0cf47d716e8d34324c0fa2d890de3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-6012-6199 0000-0002-5983-9981 |
PQID | 3160315557 |
PQPubID | 2034650 |
PageCount | 20 |
ParticipantIDs | proquest_journals_3160315557 crossref_primary_10_1002_smr_2744 wiley_primary_10_1002_smr_2744_SMR2744 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | January 2025 2025-01-00 20250101 |
PublicationDateYYYYMMDD | 2025-01-01 |
PublicationDate_xml | – month: 01 year: 2025 text: January 2025 |
PublicationDecade | 2020 |
PublicationPlace | Chichester |
PublicationPlace_xml | – name: Chichester |
PublicationTitle | Journal of software : evolution and process |
PublicationYear | 2025 |
Publisher | Wiley Subscription Services, Inc |
Publisher_xml | – name: Wiley Subscription Services, Inc |
References | 2015; 57 2010; 32 2013; 2 2012 2011 2010 2018; 102 2009 2008 2007 2006 2005 2011; 37 2012; 37 2020; 8 2018; 6 2020; 6 2009; 51 2013; 17 2021; 33 2014; 2 2023; 153 2020 2022; 34 2022; 35 2019 2022; 36 2018 2017 2016 2015 2014 2022; 10 2013 2022; 16 2012; 85 2007; 26 2010; 8 e_1_2_10_23_1 e_1_2_10_46_1 e_1_2_10_69_1 e_1_2_10_21_1 e_1_2_10_44_1 e_1_2_10_42_1 e_1_2_10_40_1 e_1_2_10_70_1 e_1_2_10_2_1 e_1_2_10_72_1 e_1_2_10_4_1 e_1_2_10_18_1 e_1_2_10_53_1 e_1_2_10_6_1 e_1_2_10_16_1 e_1_2_10_39_1 e_1_2_10_55_1 e_1_2_10_8_1 e_1_2_10_14_1 e_1_2_10_37_1 e_1_2_10_57_1 e_1_2_10_58_1 e_1_2_10_13_1 e_1_2_10_34_1 e_1_2_10_11_1 e_1_2_10_32_1 e_1_2_10_30_1 e_1_2_10_51_1 e_1_2_10_61_1 e_1_2_10_29_1 e_1_2_10_63_1 e_1_2_10_27_1 e_1_2_10_65_1 e_1_2_10_25_1 e_1_2_10_48_1 e_1_2_10_67_1 e_1_2_10_24_1 e_1_2_10_45_1 e_1_2_10_22_1 e_1_2_10_43_1 e_1_2_10_20_1 e_1_2_10_41_1 e_1_2_10_71_1 e_1_2_10_52_1 e_1_2_10_3_1 e_1_2_10_19_1 e_1_2_10_54_1 e_1_2_10_5_1 e_1_2_10_17_1 e_1_2_10_38_1 e_1_2_10_56_1 e_1_2_10_7_1 e_1_2_10_15_1 e_1_2_10_36_1 e_1_2_10_12_1 e_1_2_10_35_1 e_1_2_10_9_1 e_1_2_10_59_1 e_1_2_10_10_1 e_1_2_10_33_1 e_1_2_10_31_1 e_1_2_10_50_1 e_1_2_10_60_1 e_1_2_10_62_1 e_1_2_10_64_1 e_1_2_10_28_1 e_1_2_10_49_1 e_1_2_10_66_1 e_1_2_10_26_1 e_1_2_10_47_1 e_1_2_10_68_1 |
References_xml | – volume: 33 start-page: 1 issue: 3 year: 2021 end-page: 20 article-title: Using Software Metrics for Predicting Vulnerable Classes and Methods in Java Projects: A Machine Learning Approach publication-title: Journal of Software: Evolution and Process – year: 2011 – year: 2009 – volume: 32 start-page: 153 issue: 4 year: 2010 end-page: 165 article-title: A Systematic Review of Security Requirements Engineering publication-title: Computer Standards & Interfaces – start-page: 217 year: 2005 end-page: 227 – start-page: 61 year: 2010 end-page: 69 – volume: 8 start-page: 29 issue: 2 year: 2010 end-page: 33 article-title: The Applicability of Existing Metrics for Software Security publication-title: International Journal of Computer Applications – start-page: 6 end-page: 8 – year: 2005 – volume: 85 start-page: 193 issue: 1 year: 2012 end-page: 208 article-title: Appraisal and Reporting of Security Assurance at Operational Systems Level publication-title: Journal of Systems and Software – start-page: 421 year: 2010 end-page: 428 – volume: 6 start-page: 1 issue: 3 year: 2018 end-page: 52 article-title: A Survey of Search‐Based Refactoring for Software Maintenance publication-title: Journal of Software Engineering Research and Development – start-page: 618 year: 2009 end-page: 623 – volume: 16 start-page: 167 issue: 2 year: 2022 end-page: 184 article-title: Value‐Oriented Quality Metrics in Software Development: Practical Relevance From a Software Engineering Perspective publication-title: IET Software – year: 2018 – volume: 8 start-page: 36226 year: 2020 end-page: 36243 article-title: On Using Grey Literature and Google Scholar in Systematic Literature Reviews in Software Engineering publication-title: IEEE Access – year: 2014 – start-page: 13 year: 2014 end-page: 18 – start-page: 181 year: 2009 end-page: 190 – start-page: 233 year: 2013 end-page: 247 – volume: 57 start-page: 217 issue: 1 year: 2015 end-page: 247 article-title: A Comprehensive Pattern‐Oriented Approach to Engineering Security Methodologies publication-title: Information and Software Technology – start-page: 57 end-page: 64 – start-page: 1013 year: 2006 end-page: 1023 – start-page: 352 year: 2011 end-page: 355 – start-page: 31 year: 2008 end-page: 37 – year: 2019 – start-page: 93 year: 2010 end-page: 96 – volume: 10 start-page: 5456 year: 2022 end-page: 5481 article-title: Systematic Literature Review on Security Risks and Its Practices in Secure Software Development publication-title: IEEE Access – volume: 153 year: 2023 article-title: Secure Software Design Evaluation and Decision Making Model for Ubiquitous Computing: A Two‐Stage ANN‐Fuzzy AHP Approach publication-title: Computers in Human Behavior – volume: 37 start-page: 772 issue: 6 year: 2011 end-page: 787 article-title: Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities publication-title: IEEE Transactions on Software Engineering – volume: 102 start-page: 146 year: 2018 end-page: 159 article-title: Mapping the Field of Software Life Cycle Security Metrics publication-title: Information and Software Technology – volume: 26 start-page: 219 year: 2007 end-page: 228 article-title: Measuring, Analyzing and Predicting Security Vulnerabilities in Software Systems publication-title: Computers & Security – start-page: 461 year: 2008 end-page: 465 – volume: 35 start-page: 1 year: 2022 end-page: 26 article-title: Model‐Driven Engineering of Safety and Security Software Systems: A Systematic Mapping Study and Future Research Directions publication-title: Journal of Software: Evolution and Process – start-page: 1293 year: 2012 end-page: 1296 – start-page: 1 year: 2012 end-page: 10 – volume: 2 start-page: 3182 issue: 3 year: 2014 end-page: 3189 – start-page: 15 year: 2019 end-page: 46 – start-page: 162 year: 2010 end-page: 169 – year: 2007 – start-page: 413 year: 2020 end-page: 420 – volume: 6 start-page: 147 issue: 2 year: 2020 end-page: 156 article-title: A Systematic Literature Review of Blockchain Cyber Security publication-title: Digital Communications and Networks – volume: 8 start-page: 183913 year: 2020 end-page: 183926 article-title: Analyzing Factors That Influence Offshore Outsourcing Decision of Application Maintenance publication-title: IEEE Access – start-page: 487 year: 2020 end-page: 492 – start-page: 564 year: 2009 end-page: 573 – start-page: 414 year: 2009 end-page: 421 – year: 2016 – start-page: 516 year: 2009 end-page: 525 – start-page: 1 year: 2014 end-page: 8 – start-page: 662 year: 2013 end-page: 671 – start-page: 1963 year: 2010 end-page: 1969 – year: 2010 – volume: 34 issue: 7 year: 2022 article-title: On the Utilization of Non‐Quality Assessed Literature in Software Engineering Research publication-title: Journal of Software: Evolution and Process – year: 2012 – start-page: 545 year: 2009 end-page: 553 – volume: 2 start-page: 150 year: 2013 end-page: 155 article-title: Software Security Metric Development Framework (An Early Stage Approach) publication-title: American Journal of Software Engineering and Applications – volume: 51 start-page: 7 issue: 1 year: 2009 end-page: 15 article-title: Systematic Literature Reviews in Software Engineering—A Systematic Literature Review publication-title: Information and Software Technology – volume: 36 issue: 3 year: 2022 article-title: Security Risks of Global Software Development Life Cycle: Industry practitioner's Perspective publication-title: Journal of Software: Evolution and Process – start-page: 593 year: 2008 end-page: 598 – start-page: 426 year: 2015 end-page: 437 – volume: 51 start-page: 957 issue: 6 year: 2009 end-page: 976 article-title: A Systematic Review of Search‐Based Testing for Non‐Functional System Properties publication-title: Information and Software Technology – volume: 37 start-page: 12 issue: 2 year: 2012 end-page: 14 article-title: Integrity Quantification Model for Object Oriented Design publication-title: ACM SIGSOFT Software Engineering Notes – start-page: 49 year: 2013 end-page: 54 – year: 2017 – volume: 17 start-page: 173 issue: 4 year: 2013 end-page: 184 article-title: Analyses of Two End‐User Software Vulnerability Exposure Metrics (Extended Version) publication-title: Information Security Technical Report – year: 2013 – ident: e_1_2_10_44_1 – ident: e_1_2_10_14_1 doi: 10.1109/THS.2008.4534520 – ident: e_1_2_10_72_1 doi: 10.1016/j.chb.2023.108109 – ident: e_1_2_10_29_1 doi: 10.1109/WCSE.2010.104 – ident: e_1_2_10_9_1 doi: 10.1109/ICST.2009.36 – ident: e_1_2_10_24_1 doi: 10.1109/SERE-C.2014.17 – ident: e_1_2_10_31_1 doi: 10.1016/j.csi.2010.01.006 – ident: e_1_2_10_18_1 doi: 10.4018/978-1-5225-6313-6.ch002 – ident: e_1_2_10_38_1 doi: 10.1145/1071021.1071046 – ident: e_1_2_10_65_1 doi: 10.1007/11751595_106 – ident: e_1_2_10_28_1 – ident: e_1_2_10_6_1 doi: 10.1007/978-3-642-11747-3_5 – ident: e_1_2_10_21_1 doi: 10.1109/ESEM.2009.5314220 – ident: e_1_2_10_47_1 doi: 10.1016/j.dcan.2019.01.005 – ident: e_1_2_10_52_1 – ident: e_1_2_10_26_1 doi: 10.1109/SEAA51224.2020.00073 – ident: e_1_2_10_36_1 doi: 10.1109/NetCoM.2009.77 – ident: e_1_2_10_60_1 doi: 10.1145/2108144.2108154 – ident: e_1_2_10_27_1 – ident: e_1_2_10_13_1 doi: 10.1049/sfw2.12051 – ident: e_1_2_10_53_1 doi: 10.5120/1184-1638 – ident: e_1_2_10_17_1 doi: 10.1145/3234152.3234187 – ident: e_1_2_10_42_1 doi: 10.1145/1370905.1370913 – ident: e_1_2_10_66_1 doi: 10.1109/ICSE.2013.6606612 – ident: e_1_2_10_30_1 doi: 10.1109/ESEM.2009.5314213 – ident: e_1_2_10_50_1 doi: 10.1016/j.infsof.2008.12.005 – ident: e_1_2_10_20_1 doi: 10.1109/ESEM.2009.5314215 – ident: e_1_2_10_37_1 doi: 10.1016/j.istr.2013.02.002 – ident: e_1_2_10_12_1 – ident: e_1_2_10_48_1 doi: 10.1016/j.infsof.2008.09.009 – ident: e_1_2_10_7_1 doi: 10.1016/j.infsof.2014.09.001 – ident: e_1_2_10_19_1 doi: 10.1145/1852786.1852798 – ident: e_1_2_10_43_1 doi: 10.7763/LNSE.2016.V4.239 – ident: e_1_2_10_45_1 doi: 10.1109/ISA.2008.104 – ident: e_1_2_10_67_1 – ident: e_1_2_10_8_1 doi: 10.1002/smr.2521 – ident: e_1_2_10_57_1 doi: 10.1016/j.cose.2006.10.002 – ident: e_1_2_10_22_1 doi: 10.1109/ARES.2012.33 – ident: e_1_2_10_56_1 doi: 10.1109/HASE.2014.10 – ident: e_1_2_10_59_1 doi: 10.1109/ESEM.2013.19 – ident: e_1_2_10_71_1 doi: 10.1109/ACCESS.2020.2971712 – ident: e_1_2_10_4_1 doi: 10.1145/1456362.1456370 – ident: e_1_2_10_41_1 – ident: e_1_2_10_49_1 doi: 10.1109/ACCESS.2022.3140181 – ident: e_1_2_10_58_1 doi: 10.1016/j.infsof.2018.05.011 – ident: e_1_2_10_39_1 – ident: e_1_2_10_70_1 doi: 10.1002/smr.2464 – ident: e_1_2_10_35_1 doi: 10.1145/2810103.2813604 – ident: e_1_2_10_10_1 doi: 10.1145/1842752.1842787 – ident: e_1_2_10_51_1 doi: 10.5120/ijais2017451710 – ident: e_1_2_10_46_1 – ident: e_1_2_10_40_1 – ident: e_1_2_10_62_1 doi: 10.1109/QSIC.2011.31 – ident: e_1_2_10_34_1 doi: 10.1109/ICST.2010.32 – ident: e_1_2_10_64_1 doi: 10.1109/ISIAS.2013.6947732 – ident: e_1_2_10_69_1 doi: 10.1109/ACCESS.2020.3029501 – ident: e_1_2_10_25_1 doi: 10.1145/3339252.3339263 – ident: e_1_2_10_3_1 doi: 10.1145/1774088.1774504 – ident: e_1_2_10_32_1 doi: 10.1109/MINES.2011.27 – ident: e_1_2_10_55_1 doi: 10.1109/ICSE.2012.6227096 – ident: e_1_2_10_54_1 – ident: e_1_2_10_63_1 doi: 10.1109/ARES.2009.130 – ident: e_1_2_10_61_1 doi: 10.1186/s40411‐018‐0046‐4 – ident: e_1_2_10_15_1 doi: 10.1007/978-3-642-40779-6_23 – ident: e_1_2_10_68_1 doi: 10.11648/j.ajsea.20130206.14 – ident: e_1_2_10_33_1 doi: 10.1109/TSE.2010.81 – ident: e_1_2_10_23_1 doi: 10.1016/j.jss.2011.08.013 – ident: e_1_2_10_11_1 doi: 10.1002/smr.2303 – ident: e_1_2_10_5_1 doi: 10.1145/3383219.3383290 – ident: e_1_2_10_16_1 doi: 10.1145/3230833.3233274 – ident: e_1_2_10_2_1 doi: 10.1002/smr.2457 |
SSID | ssj0000620545 |
Score | 2.315322 |
Snippet | ABSTRACT
Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development... Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development of... |
SourceID | proquest crossref wiley |
SourceType | Aggregation Database Index Database Publisher |
SubjectTerms | Criteria Cybersecurity Literature reviews secure software development security metrics Software Software development software development life cycle software engineering software security SWOT analysis systematic literature review Threat evaluation |
Title | A SWOT Analysis of Software Development Life Cycle Security Metrics |
URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsmr.2744 https://www.proquest.com/docview/3160315557 |
Volume | 37 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1dS8MwFA2yJ1-cnzidEkF86xaTtGsex3AMcQrrhgMfSpImIOIm7Yborze3H9sUBPGlpdCU5jb35uT25hyELgOuuC8Z_Bo0zOPMMk8JqzylhRRaKZHkWgTD-2Aw4bdTf1pWVcJemIIfYpVwA8_I4zU4uFRZe00amr2mLaC3c-EXSrUAD43oKr1CAurACBQwUuAicKCZVdSzhLartt8nozXC3MSp-UTTr6On6hWL-pKX1nKhWvrzB3vj__qwi3ZK_Im7xYDZQ1tmto_qlbYDLl39APW6OHp8GOOKtATPLY5cyH6XqcEblUb47tka3PtwD8NRqYWHhyDTpbNDNOnfjHsDrxRc8DQwlTmkHSYdB7mE4glVAbOWKyKJdWs64aZ1rYW70pZ3ErfKMmECm1K5JlbSJBQkMewI1WbzmTlGWDIjryWn2rijH2pFBDNBSJRQwCkXNNBFZfn4reDViAsGZRo7q8RglQZqVp8kLj0ri1mui-37fqeBrnLb_to-joYjOJ_89cZTtE1B3jfPsDRRbZEuzZnDHAt1no-uL4yR0fE |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFD7M-aAvzitOp0YQ37rVJO0afBrDMXWdsG64B6E0aQIibrILor_epJdtCoL40lJoSnOak3zn9OT7AC5cyqkTEfNrUBKLEkUszhS3uGARE5yzONEi8Ltue0Dvhs6wANf5XpiUH2KRcDOekczXxsFNQrq2ZA2dvk6qht9uDdaNoHcST_XwIsFiu1jDEVPCiA0bgYbNJCeftXEtb_x9OVpizFWkmiw1rRI85S-ZVpi8VOczXhWfP_gb_9mLbdjKIChqpGNmBwpytAulXN4BZd6-B80GCh4f-ijnLUFjhQI9a79HE4lWio1Q51lJ1PzQD0NBJoeHfKPUJab7MGjd9JttK9NcsIQhK9Ng24vrGnUxTmPMXaIU5XZkKx3WMb2yC8H0lVC0HutAS3qx2ZdKha0iHHvMjiU5gOJoPJKHgCIio6uIYiH10fEEtxmRrmdzxg2tnFuG89z04VtKrRGmJMo41FYJjVXKUMm_SZg51zQkiTS24zj1Mlwmxv21fRj4PXM--uuNZ7DR7vudsHPbvT-GTWzUfpOESwWKs8lcnmgIMuOnyVD7Arhj1gw |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFD7oBPHFecXp1AjiW7eYpF3zOKZjXjZldTjwoTQ3EHGTbSL660168QaC-NJSaEpzek7y5fTk-wAOAyaYn1D3a1BTj1FDPcGN8ITkCZdCcJVqEXR7QWfAzof-MK-qdHthMn6Ij4Sbi4x0vHYB_qRM_ZM0dPo4qTl6u3lYYAEOnUef9MlHfgUHxKIRV8FIHBmBRc204J7FpF40_j4bfULMr0A1nWnaZbgr3jErMHmoPc9ETb79oG_8XydWYDkHoKiZecwqzOnRGpQLcQeUx_o6tJoour26QQVrCRobFNkx-yWZaPSl1Ahd3huNWq_2YSjKxfBQ1-l0yekGDNqnN62OlysueNJRlVmoHaqGxVxcMEVEQI1hAifY2EUdt_O6lNxeScMayi6zdKjcrlQmsUmICjlWmm5CaTQe6S1ACdXJccKI1Pboh1JgTnUQYsGFI5ULKnBQWD5-yog14oxCmcTWKrGzSgWqxSeJ89CaxjQVxvZ9v1GBo9S2v7aPo27fnbf_euM-LF6ftOPLs97FDiwRJ_WbZluqUJpNnvWuxR8zsZc62jtzftTE |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+SWOT+Analysis+of+Software+Development+Life+Cycle+Security+Metrics&rft.jtitle=Journal+of+software+%3A+evolution+and+process&rft.au=Khalid%2C+Ayesha&rft.au=Raza%2C+Mushtaq&rft.au=Afsar%2C+Palwasha&rft.au=Rafiq%C2%A0Ahmad+Khan&rft.date=2025-01-01&rft.pub=Wiley+Subscription+Services%2C+Inc&rft.eissn=2047-7481&rft.volume=37&rft.issue=1&rft_id=info:doi/10.1002%2Fsmr.2744&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2047-7473&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2047-7473&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2047-7473&client=summon |