A SWOT Analysis of Software Development Life Cycle Security Metrics

ABSTRACT Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development of information and communication technologies (ICT), the widespread usage of software systems has transformed modern society in many ways bu...

Full description

Saved in:
Bibliographic Details
Published inJournal of software : evolution and process Vol. 37; no. 1
Main Authors Khalid, Ayesha, Raza, Mushtaq, Afsar, Palwasha, Khan, Rafiq Ahmad, Mohmand, Muhammad Ismail, Rahman, Hanif Ur
Format Journal Article
LanguageEnglish
Published Chichester Wiley Subscription Services, Inc 01.01.2025
Subjects
Online AccessGet full text

Cover

Loading…
Abstract ABSTRACT Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development of information and communication technologies (ICT), the widespread usage of software systems has transformed modern society in many ways but also created new issues in protecting confidential and sensitive information. The quantification of security measures can provide evidence to support decision‐making in software security, particularly when assessing the security performance of software systems. This entails understanding the key quality criteria of security metrics, which can assist in constructing security models aligned with practical requirements. To delve deeper into this subject, the current study conducted a systematic literature review (SLR) on security metrics and measures within the realm of secure software development (SSD). The study selected 61 research publications for data extraction based on the specific inclusion and exclusion criteria. The study identified 215 software security metrics and classified them into different phases of software development life cycle (SDLC). In order to evaluate the most cited metrics in each phase of SDLC, the strengths, weaknesses, opportunities, and threats (SWOT) analysis was performed. The SWOT analysis offers a structured framework enabling researchers to make more effective, well‐informed decisions and mitigate potential risks, ultimately contributing to more valuable research findings. The study's findings provide researchers guidance for exploring emerging trends and addressing existing gaps in SDLC. This study also provides software professionals with a more comprehensive understanding of security measurements, constraints, and open‐ended specific and general issues. This paper presents a comprehensive SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis of security metrics applied within the Software Development Life Cycle (SDLC). By evaluating key metrics such as secure testing, implementation, design, and maintenance, the study identifies their strengths in enhancing software resilience and highlights gaps in under‐prioritized areas like secure maintenance. Opportunities for integrating advanced tools and frameworks are discussed, alongside emerging threats posed by evolving cybersecurity challenges. The findings offer actionable insights for optimizing the use of security metrics across the SDLC to strengthen overall software security
AbstractList Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development of information and communication technologies (ICT), the widespread usage of software systems has transformed modern society in many ways but also created new issues in protecting confidential and sensitive information. The quantification of security measures can provide evidence to support decision‐making in software security, particularly when assessing the security performance of software systems. This entails understanding the key quality criteria of security metrics, which can assist in constructing security models aligned with practical requirements. To delve deeper into this subject, the current study conducted a systematic literature review (SLR) on security metrics and measures within the realm of secure software development (SSD). The study selected 61 research publications for data extraction based on the specific inclusion and exclusion criteria. The study identified 215 software security metrics and classified them into different phases of software development life cycle (SDLC). In order to evaluate the most cited metrics in each phase of SDLC, the strengths, weaknesses, opportunities, and threats (SWOT) analysis was performed. The SWOT analysis offers a structured framework enabling researchers to make more effective, well‐informed decisions and mitigate potential risks, ultimately contributing to more valuable research findings. The study's findings provide researchers guidance for exploring emerging trends and addressing existing gaps in SDLC. This study also provides software professionals with a more comprehensive understanding of security measurements, constraints, and open‐ended specific and general issues.
ABSTRACT Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development of information and communication technologies (ICT), the widespread usage of software systems has transformed modern society in many ways but also created new issues in protecting confidential and sensitive information. The quantification of security measures can provide evidence to support decision‐making in software security, particularly when assessing the security performance of software systems. This entails understanding the key quality criteria of security metrics, which can assist in constructing security models aligned with practical requirements. To delve deeper into this subject, the current study conducted a systematic literature review (SLR) on security metrics and measures within the realm of secure software development (SSD). The study selected 61 research publications for data extraction based on the specific inclusion and exclusion criteria. The study identified 215 software security metrics and classified them into different phases of software development life cycle (SDLC). In order to evaluate the most cited metrics in each phase of SDLC, the strengths, weaknesses, opportunities, and threats (SWOT) analysis was performed. The SWOT analysis offers a structured framework enabling researchers to make more effective, well‐informed decisions and mitigate potential risks, ultimately contributing to more valuable research findings. The study's findings provide researchers guidance for exploring emerging trends and addressing existing gaps in SDLC. This study also provides software professionals with a more comprehensive understanding of security measurements, constraints, and open‐ended specific and general issues. This paper presents a comprehensive SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis of security metrics applied within the Software Development Life Cycle (SDLC). By evaluating key metrics such as secure testing, implementation, design, and maintenance, the study identifies their strengths in enhancing software resilience and highlights gaps in under‐prioritized areas like secure maintenance. Opportunities for integrating advanced tools and frameworks are discussed, alongside emerging threats posed by evolving cybersecurity challenges. The findings offer actionable insights for optimizing the use of security metrics across the SDLC to strengthen overall software security
Author Raza, Mushtaq
Rahman, Hanif Ur
Khan, Rafiq Ahmad
Mohmand, Muhammad Ismail
Khalid, Ayesha
Afsar, Palwasha
Author_xml – sequence: 1
  givenname: Ayesha
  surname: Khalid
  fullname: Khalid, Ayesha
  organization: Abdul Wali Khan University
– sequence: 2
  givenname: Mushtaq
  surname: Raza
  fullname: Raza, Mushtaq
  organization: Abdul Wali Khan University
– sequence: 3
  givenname: Palwasha
  surname: Afsar
  fullname: Afsar, Palwasha
  organization: Abdul Wali Khan University
– sequence: 4
  givenname: Rafiq Ahmad
  orcidid: 0000-0002-5983-9981
  surname: Khan
  fullname: Khan, Rafiq Ahmad
  email: rafiqahmadk@gmail.com
  organization: University of Malakand
– sequence: 5
  givenname: Muhammad Ismail
  surname: Mohmand
  fullname: Mohmand, Muhammad Ismail
  organization: Sarhad University of Information Technology SUIT
– sequence: 6
  givenname: Hanif Ur
  orcidid: 0000-0001-6012-6199
  surname: Rahman
  fullname: Rahman, Hanif Ur
  organization: Khyber Pakhtunkhwa (KPK)
BookMark eNp10E1Lw0AQBuBFKlhrwZ-w4MVL6n5mk2OJVoWWgql4XNLNLKSk2bibWvLvTa14cy4zAw_D8F6jUeMaQOiWkhklhD2EvZ8xJcQFGjMiVKREQkd_s-JXaBrCjgwVMyKFHKNsjvOP9QbPm6LuQxWwszh3tjsWHvAjfEHt2j00HV5WFnDWmxpwDubgq67HK-h8ZcINurRFHWD62yfoffG0yV6i5fr5NZsvI8OkEJFSSalSSdOtKNk25taKLSmIpSlNE8mNSYfNWKFKRWNISi44E4bYgpVJSkrgE3R3vtt693mA0OmdO_jh8aA5jQmnUko1qPuzMt6F4MHq1lf7wveaEn1KSQ8p6VNKA43O9FjV0P_rdL56-_HfhMRoIg
Cites_doi 10.1109/THS.2008.4534520
10.1016/j.chb.2023.108109
10.1109/WCSE.2010.104
10.1109/ICST.2009.36
10.1109/SERE-C.2014.17
10.1016/j.csi.2010.01.006
10.4018/978-1-5225-6313-6.ch002
10.1145/1071021.1071046
10.1007/11751595_106
10.1007/978-3-642-11747-3_5
10.1109/ESEM.2009.5314220
10.1016/j.dcan.2019.01.005
10.1109/SEAA51224.2020.00073
10.1109/NetCoM.2009.77
10.1145/2108144.2108154
10.1049/sfw2.12051
10.5120/1184-1638
10.1145/3234152.3234187
10.1145/1370905.1370913
10.1109/ICSE.2013.6606612
10.1109/ESEM.2009.5314213
10.1016/j.infsof.2008.12.005
10.1109/ESEM.2009.5314215
10.1016/j.istr.2013.02.002
10.1016/j.infsof.2008.09.009
10.1016/j.infsof.2014.09.001
10.1145/1852786.1852798
10.7763/LNSE.2016.V4.239
10.1109/ISA.2008.104
10.1002/smr.2521
10.1016/j.cose.2006.10.002
10.1109/ARES.2012.33
10.1109/HASE.2014.10
10.1109/ESEM.2013.19
10.1109/ACCESS.2020.2971712
10.1145/1456362.1456370
10.1109/ACCESS.2022.3140181
10.1016/j.infsof.2018.05.011
10.1002/smr.2464
10.1145/2810103.2813604
10.1145/1842752.1842787
10.5120/ijais2017451710
10.1109/QSIC.2011.31
10.1109/ICST.2010.32
10.1109/ISIAS.2013.6947732
10.1109/ACCESS.2020.3029501
10.1145/3339252.3339263
10.1145/1774088.1774504
10.1109/MINES.2011.27
10.1109/ICSE.2012.6227096
10.1109/ARES.2009.130
10.1186/s40411‐018‐0046‐4
10.1007/978-3-642-40779-6_23
10.11648/j.ajsea.20130206.14
10.1109/TSE.2010.81
10.1016/j.jss.2011.08.013
10.1002/smr.2303
10.1145/3383219.3383290
10.1145/3230833.3233274
10.1002/smr.2457
ContentType Journal Article
Copyright 2024 John Wiley & Sons Ltd.
2025 John Wiley & Sons, Ltd.
Copyright_xml – notice: 2024 John Wiley & Sons Ltd.
– notice: 2025 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/smr.2744
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef

Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2047-7481
EndPage n/a
ExternalDocumentID 10_1002_smr_2744
SMR2744
Genre article
GroupedDBID .3N
.4S
.GA
.Y3
05W
0R~
10A
1OB
1OC
31~
33P
3SF
50Z
52O
52U
8-0
8-1
8-3
8-4
8-5
930
A03
AAESR
AAEVG
AAHQN
AAMNL
AANHP
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAZKR
ABCUV
ABPVW
ACAHQ
ACBWZ
ACCZN
ACPOU
ACRPL
ACXBN
ACXQS
ACYXJ
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADMLS
ADNMO
ADOZA
ADXAS
ADZMN
AEIGN
AEIMD
AEUYR
AEYWJ
AFBPY
AFFPM
AFGKR
AFWVQ
AFZJQ
AGHNM
AGQPQ
AGYGG
AHBTC
AITYG
AIURR
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ARCSS
ATUGU
AUFTA
AZBYB
AZFZN
BAFTC
BDRZF
BHBCM
BMNLL
BMXJE
BRXPI
BY8
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
EBS
EDO
EJD
F00
F01
F04
G-S
G.N
GODZA
HGLYW
HZ~
I-F
LATKE
LEEKS
LH4
LITHE
LOXES
LUTES
LW6
LYRES
MEWTI
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
O66
O9-
P2W
P2X
PQQKQ
Q.N
Q11
QB0
R.K
ROL
SUPJJ
TUS
W8V
W99
WBKPD
WIH
WIK
WOHZO
WXSBR
WYISQ
WZISG
~WT
AAHHS
AAYXX
ACCFJ
AEEZP
AEQDE
AIWBW
AJBDE
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c2544-778d79519b4d2b63ff4b0a0f1919853cc90a0cf47d716e8d34324c0fa2d890de3
IEDL.DBID DR2
ISSN 2047-7473
IngestDate Wed Aug 13 10:44:11 EDT 2025
Tue Jul 01 01:44:45 EDT 2025
Wed Aug 20 07:26:39 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2544-778d79519b4d2b63ff4b0a0f1919853cc90a0cf47d716e8d34324c0fa2d890de3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-6012-6199
0000-0002-5983-9981
PQID 3160315557
PQPubID 2034650
PageCount 20
ParticipantIDs proquest_journals_3160315557
crossref_primary_10_1002_smr_2744
wiley_primary_10_1002_smr_2744_SMR2744
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate January 2025
2025-01-00
20250101
PublicationDateYYYYMMDD 2025-01-01
PublicationDate_xml – month: 01
  year: 2025
  text: January 2025
PublicationDecade 2020
PublicationPlace Chichester
PublicationPlace_xml – name: Chichester
PublicationTitle Journal of software : evolution and process
PublicationYear 2025
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2015; 57
2010; 32
2013; 2
2012
2011
2010
2018; 102
2009
2008
2007
2006
2005
2011; 37
2012; 37
2020; 8
2018; 6
2020; 6
2009; 51
2013; 17
2021; 33
2014; 2
2023; 153
2020
2022; 34
2022; 35
2019
2022; 36
2018
2017
2016
2015
2014
2022; 10
2013
2022; 16
2012; 85
2007; 26
2010; 8
e_1_2_10_23_1
e_1_2_10_46_1
e_1_2_10_69_1
e_1_2_10_21_1
e_1_2_10_44_1
e_1_2_10_42_1
e_1_2_10_40_1
e_1_2_10_70_1
e_1_2_10_2_1
e_1_2_10_72_1
e_1_2_10_4_1
e_1_2_10_18_1
e_1_2_10_53_1
e_1_2_10_6_1
e_1_2_10_16_1
e_1_2_10_39_1
e_1_2_10_55_1
e_1_2_10_8_1
e_1_2_10_14_1
e_1_2_10_37_1
e_1_2_10_57_1
e_1_2_10_58_1
e_1_2_10_13_1
e_1_2_10_34_1
e_1_2_10_11_1
e_1_2_10_32_1
e_1_2_10_30_1
e_1_2_10_51_1
e_1_2_10_61_1
e_1_2_10_29_1
e_1_2_10_63_1
e_1_2_10_27_1
e_1_2_10_65_1
e_1_2_10_25_1
e_1_2_10_48_1
e_1_2_10_67_1
e_1_2_10_24_1
e_1_2_10_45_1
e_1_2_10_22_1
e_1_2_10_43_1
e_1_2_10_20_1
e_1_2_10_41_1
e_1_2_10_71_1
e_1_2_10_52_1
e_1_2_10_3_1
e_1_2_10_19_1
e_1_2_10_54_1
e_1_2_10_5_1
e_1_2_10_17_1
e_1_2_10_38_1
e_1_2_10_56_1
e_1_2_10_7_1
e_1_2_10_15_1
e_1_2_10_36_1
e_1_2_10_12_1
e_1_2_10_35_1
e_1_2_10_9_1
e_1_2_10_59_1
e_1_2_10_10_1
e_1_2_10_33_1
e_1_2_10_31_1
e_1_2_10_50_1
e_1_2_10_60_1
e_1_2_10_62_1
e_1_2_10_64_1
e_1_2_10_28_1
e_1_2_10_49_1
e_1_2_10_66_1
e_1_2_10_26_1
e_1_2_10_47_1
e_1_2_10_68_1
References_xml – volume: 33
  start-page: 1
  issue: 3
  year: 2021
  end-page: 20
  article-title: Using Software Metrics for Predicting Vulnerable Classes and Methods in Java Projects: A Machine Learning Approach
  publication-title: Journal of Software: Evolution and Process
– year: 2011
– year: 2009
– volume: 32
  start-page: 153
  issue: 4
  year: 2010
  end-page: 165
  article-title: A Systematic Review of Security Requirements Engineering
  publication-title: Computer Standards & Interfaces
– start-page: 217
  year: 2005
  end-page: 227
– start-page: 61
  year: 2010
  end-page: 69
– volume: 8
  start-page: 29
  issue: 2
  year: 2010
  end-page: 33
  article-title: The Applicability of Existing Metrics for Software Security
  publication-title: International Journal of Computer Applications
– start-page: 6
  end-page: 8
– year: 2005
– volume: 85
  start-page: 193
  issue: 1
  year: 2012
  end-page: 208
  article-title: Appraisal and Reporting of Security Assurance at Operational Systems Level
  publication-title: Journal of Systems and Software
– start-page: 421
  year: 2010
  end-page: 428
– volume: 6
  start-page: 1
  issue: 3
  year: 2018
  end-page: 52
  article-title: A Survey of Search‐Based Refactoring for Software Maintenance
  publication-title: Journal of Software Engineering Research and Development
– start-page: 618
  year: 2009
  end-page: 623
– volume: 16
  start-page: 167
  issue: 2
  year: 2022
  end-page: 184
  article-title: Value‐Oriented Quality Metrics in Software Development: Practical Relevance From a Software Engineering Perspective
  publication-title: IET Software
– year: 2018
– volume: 8
  start-page: 36226
  year: 2020
  end-page: 36243
  article-title: On Using Grey Literature and Google Scholar in Systematic Literature Reviews in Software Engineering
  publication-title: IEEE Access
– year: 2014
– start-page: 13
  year: 2014
  end-page: 18
– start-page: 181
  year: 2009
  end-page: 190
– start-page: 233
  year: 2013
  end-page: 247
– volume: 57
  start-page: 217
  issue: 1
  year: 2015
  end-page: 247
  article-title: A Comprehensive Pattern‐Oriented Approach to Engineering Security Methodologies
  publication-title: Information and Software Technology
– start-page: 57
  end-page: 64
– start-page: 1013
  year: 2006
  end-page: 1023
– start-page: 352
  year: 2011
  end-page: 355
– start-page: 31
  year: 2008
  end-page: 37
– year: 2019
– start-page: 93
  year: 2010
  end-page: 96
– volume: 10
  start-page: 5456
  year: 2022
  end-page: 5481
  article-title: Systematic Literature Review on Security Risks and Its Practices in Secure Software Development
  publication-title: IEEE Access
– volume: 153
  year: 2023
  article-title: Secure Software Design Evaluation and Decision Making Model for Ubiquitous Computing: A Two‐Stage ANN‐Fuzzy AHP Approach
  publication-title: Computers in Human Behavior
– volume: 37
  start-page: 772
  issue: 6
  year: 2011
  end-page: 787
  article-title: Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities
  publication-title: IEEE Transactions on Software Engineering
– volume: 102
  start-page: 146
  year: 2018
  end-page: 159
  article-title: Mapping the Field of Software Life Cycle Security Metrics
  publication-title: Information and Software Technology
– volume: 26
  start-page: 219
  year: 2007
  end-page: 228
  article-title: Measuring, Analyzing and Predicting Security Vulnerabilities in Software Systems
  publication-title: Computers & Security
– start-page: 461
  year: 2008
  end-page: 465
– volume: 35
  start-page: 1
  year: 2022
  end-page: 26
  article-title: Model‐Driven Engineering of Safety and Security Software Systems: A Systematic Mapping Study and Future Research Directions
  publication-title: Journal of Software: Evolution and Process
– start-page: 1293
  year: 2012
  end-page: 1296
– start-page: 1
  year: 2012
  end-page: 10
– volume: 2
  start-page: 3182
  issue: 3
  year: 2014
  end-page: 3189
– start-page: 15
  year: 2019
  end-page: 46
– start-page: 162
  year: 2010
  end-page: 169
– year: 2007
– start-page: 413
  year: 2020
  end-page: 420
– volume: 6
  start-page: 147
  issue: 2
  year: 2020
  end-page: 156
  article-title: A Systematic Literature Review of Blockchain Cyber Security
  publication-title: Digital Communications and Networks
– volume: 8
  start-page: 183913
  year: 2020
  end-page: 183926
  article-title: Analyzing Factors That Influence Offshore Outsourcing Decision of Application Maintenance
  publication-title: IEEE Access
– start-page: 487
  year: 2020
  end-page: 492
– start-page: 564
  year: 2009
  end-page: 573
– start-page: 414
  year: 2009
  end-page: 421
– year: 2016
– start-page: 516
  year: 2009
  end-page: 525
– start-page: 1
  year: 2014
  end-page: 8
– start-page: 662
  year: 2013
  end-page: 671
– start-page: 1963
  year: 2010
  end-page: 1969
– year: 2010
– volume: 34
  issue: 7
  year: 2022
  article-title: On the Utilization of Non‐Quality Assessed Literature in Software Engineering Research
  publication-title: Journal of Software: Evolution and Process
– year: 2012
– start-page: 545
  year: 2009
  end-page: 553
– volume: 2
  start-page: 150
  year: 2013
  end-page: 155
  article-title: Software Security Metric Development Framework (An Early Stage Approach)
  publication-title: American Journal of Software Engineering and Applications
– volume: 51
  start-page: 7
  issue: 1
  year: 2009
  end-page: 15
  article-title: Systematic Literature Reviews in Software Engineering—A Systematic Literature Review
  publication-title: Information and Software Technology
– volume: 36
  issue: 3
  year: 2022
  article-title: Security Risks of Global Software Development Life Cycle: Industry practitioner's Perspective
  publication-title: Journal of Software: Evolution and Process
– start-page: 593
  year: 2008
  end-page: 598
– start-page: 426
  year: 2015
  end-page: 437
– volume: 51
  start-page: 957
  issue: 6
  year: 2009
  end-page: 976
  article-title: A Systematic Review of Search‐Based Testing for Non‐Functional System Properties
  publication-title: Information and Software Technology
– volume: 37
  start-page: 12
  issue: 2
  year: 2012
  end-page: 14
  article-title: Integrity Quantification Model for Object Oriented Design
  publication-title: ACM SIGSOFT Software Engineering Notes
– start-page: 49
  year: 2013
  end-page: 54
– year: 2017
– volume: 17
  start-page: 173
  issue: 4
  year: 2013
  end-page: 184
  article-title: Analyses of Two End‐User Software Vulnerability Exposure Metrics (Extended Version)
  publication-title: Information Security Technical Report
– year: 2013
– ident: e_1_2_10_44_1
– ident: e_1_2_10_14_1
  doi: 10.1109/THS.2008.4534520
– ident: e_1_2_10_72_1
  doi: 10.1016/j.chb.2023.108109
– ident: e_1_2_10_29_1
  doi: 10.1109/WCSE.2010.104
– ident: e_1_2_10_9_1
  doi: 10.1109/ICST.2009.36
– ident: e_1_2_10_24_1
  doi: 10.1109/SERE-C.2014.17
– ident: e_1_2_10_31_1
  doi: 10.1016/j.csi.2010.01.006
– ident: e_1_2_10_18_1
  doi: 10.4018/978-1-5225-6313-6.ch002
– ident: e_1_2_10_38_1
  doi: 10.1145/1071021.1071046
– ident: e_1_2_10_65_1
  doi: 10.1007/11751595_106
– ident: e_1_2_10_28_1
– ident: e_1_2_10_6_1
  doi: 10.1007/978-3-642-11747-3_5
– ident: e_1_2_10_21_1
  doi: 10.1109/ESEM.2009.5314220
– ident: e_1_2_10_47_1
  doi: 10.1016/j.dcan.2019.01.005
– ident: e_1_2_10_52_1
– ident: e_1_2_10_26_1
  doi: 10.1109/SEAA51224.2020.00073
– ident: e_1_2_10_36_1
  doi: 10.1109/NetCoM.2009.77
– ident: e_1_2_10_60_1
  doi: 10.1145/2108144.2108154
– ident: e_1_2_10_27_1
– ident: e_1_2_10_13_1
  doi: 10.1049/sfw2.12051
– ident: e_1_2_10_53_1
  doi: 10.5120/1184-1638
– ident: e_1_2_10_17_1
  doi: 10.1145/3234152.3234187
– ident: e_1_2_10_42_1
  doi: 10.1145/1370905.1370913
– ident: e_1_2_10_66_1
  doi: 10.1109/ICSE.2013.6606612
– ident: e_1_2_10_30_1
  doi: 10.1109/ESEM.2009.5314213
– ident: e_1_2_10_50_1
  doi: 10.1016/j.infsof.2008.12.005
– ident: e_1_2_10_20_1
  doi: 10.1109/ESEM.2009.5314215
– ident: e_1_2_10_37_1
  doi: 10.1016/j.istr.2013.02.002
– ident: e_1_2_10_12_1
– ident: e_1_2_10_48_1
  doi: 10.1016/j.infsof.2008.09.009
– ident: e_1_2_10_7_1
  doi: 10.1016/j.infsof.2014.09.001
– ident: e_1_2_10_19_1
  doi: 10.1145/1852786.1852798
– ident: e_1_2_10_43_1
  doi: 10.7763/LNSE.2016.V4.239
– ident: e_1_2_10_45_1
  doi: 10.1109/ISA.2008.104
– ident: e_1_2_10_67_1
– ident: e_1_2_10_8_1
  doi: 10.1002/smr.2521
– ident: e_1_2_10_57_1
  doi: 10.1016/j.cose.2006.10.002
– ident: e_1_2_10_22_1
  doi: 10.1109/ARES.2012.33
– ident: e_1_2_10_56_1
  doi: 10.1109/HASE.2014.10
– ident: e_1_2_10_59_1
  doi: 10.1109/ESEM.2013.19
– ident: e_1_2_10_71_1
  doi: 10.1109/ACCESS.2020.2971712
– ident: e_1_2_10_4_1
  doi: 10.1145/1456362.1456370
– ident: e_1_2_10_41_1
– ident: e_1_2_10_49_1
  doi: 10.1109/ACCESS.2022.3140181
– ident: e_1_2_10_58_1
  doi: 10.1016/j.infsof.2018.05.011
– ident: e_1_2_10_39_1
– ident: e_1_2_10_70_1
  doi: 10.1002/smr.2464
– ident: e_1_2_10_35_1
  doi: 10.1145/2810103.2813604
– ident: e_1_2_10_10_1
  doi: 10.1145/1842752.1842787
– ident: e_1_2_10_51_1
  doi: 10.5120/ijais2017451710
– ident: e_1_2_10_46_1
– ident: e_1_2_10_40_1
– ident: e_1_2_10_62_1
  doi: 10.1109/QSIC.2011.31
– ident: e_1_2_10_34_1
  doi: 10.1109/ICST.2010.32
– ident: e_1_2_10_64_1
  doi: 10.1109/ISIAS.2013.6947732
– ident: e_1_2_10_69_1
  doi: 10.1109/ACCESS.2020.3029501
– ident: e_1_2_10_25_1
  doi: 10.1145/3339252.3339263
– ident: e_1_2_10_3_1
  doi: 10.1145/1774088.1774504
– ident: e_1_2_10_32_1
  doi: 10.1109/MINES.2011.27
– ident: e_1_2_10_55_1
  doi: 10.1109/ICSE.2012.6227096
– ident: e_1_2_10_54_1
– ident: e_1_2_10_63_1
  doi: 10.1109/ARES.2009.130
– ident: e_1_2_10_61_1
  doi: 10.1186/s40411‐018‐0046‐4
– ident: e_1_2_10_15_1
  doi: 10.1007/978-3-642-40779-6_23
– ident: e_1_2_10_68_1
  doi: 10.11648/j.ajsea.20130206.14
– ident: e_1_2_10_33_1
  doi: 10.1109/TSE.2010.81
– ident: e_1_2_10_23_1
  doi: 10.1016/j.jss.2011.08.013
– ident: e_1_2_10_11_1
  doi: 10.1002/smr.2303
– ident: e_1_2_10_5_1
  doi: 10.1145/3383219.3383290
– ident: e_1_2_10_16_1
  doi: 10.1145/3230833.3233274
– ident: e_1_2_10_2_1
  doi: 10.1002/smr.2457
SSID ssj0000620545
Score 2.315322
Snippet ABSTRACT Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development...
Cyber security is an ongoing and critical concern due to persistent threats posed by threat actors, such as hackers and crackers. With the development of...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Index Database
Publisher
SubjectTerms Criteria
Cybersecurity
Literature reviews
secure software development
security metrics
Software
Software development
software development life cycle
software engineering
software security
SWOT analysis
systematic literature review
Threat evaluation
Title A SWOT Analysis of Software Development Life Cycle Security Metrics
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsmr.2744
https://www.proquest.com/docview/3160315557
Volume 37
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1dS8MwFA2yJ1-cnzidEkF86xaTtGsex3AMcQrrhgMfSpImIOIm7Yborze3H9sUBPGlpdCU5jb35uT25hyELgOuuC8Z_Bo0zOPMMk8JqzylhRRaKZHkWgTD-2Aw4bdTf1pWVcJemIIfYpVwA8_I4zU4uFRZe00amr2mLaC3c-EXSrUAD43oKr1CAurACBQwUuAicKCZVdSzhLartt8nozXC3MSp-UTTr6On6hWL-pKX1nKhWvrzB3vj__qwi3ZK_Im7xYDZQ1tmto_qlbYDLl39APW6OHp8GOOKtATPLY5cyH6XqcEblUb47tka3PtwD8NRqYWHhyDTpbNDNOnfjHsDrxRc8DQwlTmkHSYdB7mE4glVAbOWKyKJdWs64aZ1rYW70pZ3ErfKMmECm1K5JlbSJBQkMewI1WbzmTlGWDIjryWn2rijH2pFBDNBSJRQwCkXNNBFZfn4reDViAsGZRo7q8RglQZqVp8kLj0ri1mui-37fqeBrnLb_to-joYjOJ_89cZTtE1B3jfPsDRRbZEuzZnDHAt1no-uL4yR0fE
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFD7M-aAvzitOp0YQ37rVJO0afBrDMXWdsG64B6E0aQIibrILor_epJdtCoL40lJoSnOak3zn9OT7AC5cyqkTEfNrUBKLEkUszhS3uGARE5yzONEi8Ltue0Dvhs6wANf5XpiUH2KRcDOekczXxsFNQrq2ZA2dvk6qht9uDdaNoHcST_XwIsFiu1jDEVPCiA0bgYbNJCeftXEtb_x9OVpizFWkmiw1rRI85S-ZVpi8VOczXhWfP_gb_9mLbdjKIChqpGNmBwpytAulXN4BZd6-B80GCh4f-ijnLUFjhQI9a79HE4lWio1Q51lJ1PzQD0NBJoeHfKPUJab7MGjd9JttK9NcsIQhK9Ng24vrGnUxTmPMXaIU5XZkKx3WMb2yC8H0lVC0HutAS3qx2ZdKha0iHHvMjiU5gOJoPJKHgCIio6uIYiH10fEEtxmRrmdzxg2tnFuG89z04VtKrRGmJMo41FYJjVXKUMm_SZg51zQkiTS24zj1Mlwmxv21fRj4PXM--uuNZ7DR7vudsHPbvT-GTWzUfpOESwWKs8lcnmgIMuOnyVD7Arhj1gw
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFD7oBPHFecXp1AjiW7eYpF3zOKZjXjZldTjwoTQ3EHGTbSL660168QaC-NJSaEpzek7y5fTk-wAOAyaYn1D3a1BTj1FDPcGN8ITkCZdCcJVqEXR7QWfAzof-MK-qdHthMn6Ij4Sbi4x0vHYB_qRM_ZM0dPo4qTl6u3lYYAEOnUef9MlHfgUHxKIRV8FIHBmBRc204J7FpF40_j4bfULMr0A1nWnaZbgr3jErMHmoPc9ETb79oG_8XydWYDkHoKiZecwqzOnRGpQLcQeUx_o6tJoour26QQVrCRobFNkx-yWZaPSl1Ahd3huNWq_2YSjKxfBQ1-l0yekGDNqnN62OlysueNJRlVmoHaqGxVxcMEVEQI1hAifY2EUdt_O6lNxeScMayi6zdKjcrlQmsUmICjlWmm5CaTQe6S1ACdXJccKI1Pboh1JgTnUQYsGFI5ULKnBQWD5-yog14oxCmcTWKrGzSgWqxSeJ89CaxjQVxvZ9v1GBo9S2v7aPo27fnbf_euM-LF6ftOPLs97FDiwRJ_WbZluqUJpNnvWuxR8zsZc62jtzftTE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+SWOT+Analysis+of+Software+Development+Life+Cycle+Security+Metrics&rft.jtitle=Journal+of+software+%3A+evolution+and+process&rft.au=Khalid%2C+Ayesha&rft.au=Raza%2C+Mushtaq&rft.au=Afsar%2C+Palwasha&rft.au=Rafiq%C2%A0Ahmad+Khan&rft.date=2025-01-01&rft.pub=Wiley+Subscription+Services%2C+Inc&rft.eissn=2047-7481&rft.volume=37&rft.issue=1&rft_id=info:doi/10.1002%2Fsmr.2744&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2047-7473&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2047-7473&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2047-7473&client=summon