Journal articles on the topic 'Software risk assessment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Software risk assessment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Greene, N. "Computer Software for Risk Assessment." Journal of Chemical Information and Computer Sciences 37, no. 1 (January 1997): 148–50. http://dx.doi.org/10.1021/ci960095h.
Full textChen, Xingyuan, and Yong Deng. "An Evidential Software Risk Evaluation Model." Mathematics 10, no. 13 (July 2, 2022): 2325. http://dx.doi.org/10.3390/math10132325.
Full textAmmar, H. H., T. Nikzadeh, and J. B. Dugan. "Risk assessment of software-system specifications." IEEE Transactions on Reliability 50, no. 2 (June 2001): 171–83. http://dx.doi.org/10.1109/24.963125.
Full textHyatt, Lawrence E., and Linda H. Rosenberg. "Software metrics program for risk assessment." Acta Astronautica 40, no. 2-8 (January 1997): 223–33. http://dx.doi.org/10.1016/s0094-5765(97)00148-3.
Full textXu Jian, Yan Han, and Li Qianmu. "A Methodology for Software Reliability Risk Assessment." Journal of Convergence Information Technology 6, no. 4 (April 30, 2011): 188–200. http://dx.doi.org/10.4156/jcit.vol6.issue4.22.
Full textChittister, C., and Y. Y. Haimes. "Assessment and management of software technical risk." IEEE Transactions on Systems, Man, and Cybernetics 24, no. 2 (1994): 187–202. http://dx.doi.org/10.1109/21.281419.
Full textBarki, Henri, Suzanne Rivard, and Jean Talbot. "Toward an Assessment of Software Development Risk." Journal of Management Information Systems 10, no. 2 (September 1993): 203–25. http://dx.doi.org/10.1080/07421222.1993.11518006.
Full textFunieru, Cristian, and Răzvan Funieru. "Caries Risk software – a new tool used for children caries risk assessment." Romanian Journal of Stomatology 61, no. 2 (June 30, 2015): 179–82. http://dx.doi.org/10.37897/rjs.2015.2.13.
Full textTaylor, David, Derek Williamson, Harprit Kaur, Kevin Macintosh, Leo Brewster, and Ramon Roach. "BARBADOS NATIONAL COASTAL RISK INFORMATION AND PLANNING PLATFORM A SOFTWARE SYSTEM FOR HAZARDS, VULNERABILITY & RISK." Coastal Engineering Proceedings, no. 36 (December 30, 2018): 55. http://dx.doi.org/10.9753/icce.v36.risk.55.
Full textKumar, Chandan, and Dilip Kumar Yadav. "A Probabilistic Software Risk Assessment and Estimation Model for Software Projects." Procedia Computer Science 54 (2015): 353–61. http://dx.doi.org/10.1016/j.procs.2015.06.041.
Full textBIFFL, STEFAN, THOMAS MOSER, and DIETMAR WINKLER. "RISK ASSESSMENT IN MULTI-DISCIPLINARY (SOFTWARE+) ENGINEERING PROJECTS." International Journal of Software Engineering and Knowledge Engineering 21, no. 02 (March 2011): 211–36. http://dx.doi.org/10.1142/s0218194011005232.
Full textJoó, József Gábor, Mónika Csanád, Katalin Tóth, Szabolcs Máté, and Zsolt Nagy. "Risk assessment in familial breast cancer." Orvosi Hetilap 152, no. 19 (May 2011): 758–62. http://dx.doi.org/10.1556/oh.2011.29110.
Full textBARMAK, ALEXANDER, VIKTOR KUDRIAVTSEV, YRII FORKUN, and OKSANA YASHYNA. "SOFTWARE CODE ANALYSIS SYSTEM FOR RISK ASSESSMENT AND QUALITY ASSURANCE OF SOFTWARE." HERALD OF KHMELNYTSKYI NATIONAL UNIVERSITY 297, no. 3 (July 2, 2021): 25–29. http://dx.doi.org/10.31891/2307-5732-2021-297-3-25-29.
Full textNagamalleswari, D., J. Nagalakshmi, G. Karthik, and P. Harthita. "A study on risk assessment techniques in information systems." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 313. http://dx.doi.org/10.14419/ijet.v7i1.1.9711.
Full textKang, Hyun Gook, Heung-Seop Eom, and Han Seong Son. "Software Failure Probability Quantification for System Risk Assessment." Scholarly Research Exchange 2009 (2009): 1–9. http://dx.doi.org/10.3814/2009/163456.
Full textHuff, Philip, and Qinghua Li. "Towards Automating the Assessment of Software Vulnerability Risk." ICST Transactions on Security and Safety 8, no. 27 (January 12, 2021): 170247. http://dx.doi.org/10.4108/eai.25-6-2021.170247.
Full textSaveliev, D. V. "Risk Management and Assessment in Software Development Projects." Èlektronnoe modelirovanie 43, no. 4 (August 2, 2021): 113–24. http://dx.doi.org/10.15407/emodel.43.04.113.
Full textNi, M., J. D. McCalley, V. Vittal, S. Greene, C. W. Ten, V. S. Ganugula, and T. Tayyib. "Software Implementation of Online Risk-Based Security Assessment." IEEE Power Engineering Review 22, no. 11 (November 2002): 59. http://dx.doi.org/10.1109/mper.2002.4311833.
Full textNovakovic, Zoran, and Zoran Milojevic. "Software package for risk assessment in the workplace." Vojnotehnicki glasnik 56, no. 2 (2008): 217–26. http://dx.doi.org/10.5937/vojtehg0802217n.
Full textMing Ni, J. D. McCalley, V. Vittal, S. Greene, C. Ten, V. S. Ganugula, and T. Tayyib. "Software implementation of online risk-based security assessment." IEEE Transactions on Power Systems 18, no. 3 (August 2003): 1165–72. http://dx.doi.org/10.1109/tpwrs.2003.814909.
Full textMoni, Mohammad, and Pietro Liò. "comoR: a software for disease comorbidity risk assessment." Journal of Clinical Bioinformatics 4, no. 1 (2014): 8. http://dx.doi.org/10.1186/2043-9113-4-8.
Full textLima, Ana Paula Souza, Tânia Couto Machado Chianca, and Meire Chucre Tannure. "Assessment of nursing care using indicators generated by software." Revista Latino-Americana de Enfermagem 23, no. 2 (April 2015): 234–41. http://dx.doi.org/10.1590/0104-1169.0177.2547.
Full textFryer, M. O. "Risk Assessment of Computer Controlled Systems." IEEE Transactions on Software Engineering SE-11, no. 1 (January 1985): 125–29. http://dx.doi.org/10.1109/tse.1985.231849.
Full textVeevers, Alan. "Some issues in software reliability assessment." Software Testing, Verification and Reliability 1, no. 1 (1991): 17–22. http://dx.doi.org/10.1002/stvr.4370010104.
Full textDale, Chris. "The assessment of software reliability." Reliability Engineering & System Safety 34, no. 1 (January 1991): 91–103. http://dx.doi.org/10.1016/0951-8320(91)90101-c.
Full textLindermeier, Robert. "Quality assessment of software prototypes." Reliability Engineering & System Safety 43, no. 1 (January 1994): 87–94. http://dx.doi.org/10.1016/0951-8320(94)90097-3.
Full textChandani, Priyanka, and Chetna Gupta. "An Early Multi-Criteria Risk Assessment Model." Journal of Cases on Information Technology 21, no. 2 (April 2019): 51–64. http://dx.doi.org/10.4018/jcit.2019040104.
Full textZhu, Zhicheng, Kun Lan, Zhihong Rao, and Yuguang Zhang. "Risk assessment method for IoT software supply chain vulnerabilities." Journal of Physics: Conference Series 1732 (January 2021): 012051. http://dx.doi.org/10.1088/1742-6596/1732/1/012051.
Full textKarari, Poojanjali, and Pooja Jain. "A Survey on Software Cost and Risk Assessment Models." International Journal of Computer Applications 171, no. 4 (August 17, 2017): 13–18. http://dx.doi.org/10.5120/ijca2017915016.
Full textSambantha Moorthy, Jayaletchumi. "DEVELOPING USABLE SOFTWARE PRODUCT USING USABILITY RISK ASSESSMENT MODEL." International Journal of Digital Information and Wireless Communications 4, no. 1 (2014): 95–102. http://dx.doi.org/10.17781/p001088.
Full textJoh, Hyun Chul. "Modeling Software Risk Assessment Based on Multi-Vulnerability Lifecycle." International Review on Computers and Software (IRECOS) 11, no. 2 (February 29, 2016): 116. http://dx.doi.org/10.15866/irecos.v11i2.8552.
Full textJoh, HyunChul, and JooYoung Lee. "Empirical Risk Assessment in Major Graphical Design Software Systems." Journal of Multimedia Information System 8, no. 4 (December 31, 2021): 259–66. http://dx.doi.org/10.33851/jmis.2021.8.4.259.
Full textJPT staff, _. "Software Application Optimizes Well-Planning and Risk-Assessment Process." Journal of Petroleum Technology 56, no. 02 (February 1, 2004): 26–80. http://dx.doi.org/10.2118/0204-0026-jpt.
Full textGavanski, Dušan, Azra Korjenic, and Verica Milanko. "Fire risk assessment in buildings using fire protection software." International Journal of Risk Assessment and Management 17, no. 1 (2013): 1. http://dx.doi.org/10.1504/ijram.2013.054375.
Full textPeercy, D. E., M. D. Estill, and K. L. Shaw. "Risk Assessment Methodology for Software Supportability (RAMSS): User's handbook." Computers & Security 7, no. 5 (October 1988): 510. http://dx.doi.org/10.1016/0167-4048(88)90211-8.
Full textBowlds, Ted F., John M. Fossaceca, and Ronald Iammartino. "Software obsolescence risk assessment approach using multicriteria decision-making." Systems Engineering 21, no. 5 (May 28, 2018): 455–65. http://dx.doi.org/10.1002/sys.21446.
Full textReece, Wendy J., and David I. Gertman. "NUCLARR: a workstation software package to support risk assessment." Reliability Engineering & System Safety 37, no. 2 (January 1992): 173–78. http://dx.doi.org/10.1016/0951-8320(92)90011-9.
Full textWoolridge, Richard, Denise McManus, and Joanne Hale. "Stakeholder Risk Assessment: An Outcome-Based Approach." IEEE Software 24, no. 2 (March 2007): 36–45. http://dx.doi.org/10.1109/ms.2007.54.
Full textMadachy, Raymond J. "Knowledge-based risk assessment and cost estimation." Automated Software Engineering 2, no. 3 (September 1995): 219–30. http://dx.doi.org/10.1007/bf00871798.
Full textNalbandyan, М. А., and А. О. Nersisyan. "Environmental Risk Assessment in the Masrik River Basin." Agrology 4, no. 2 (2021): 71–76. http://dx.doi.org/10.32819/021009.
Full textCraigmyle, Mac, and Irwin Fletcher. "Improving IT effectiveness through software process assessment." Software Quality Journal 2, no. 4 (December 1993): 257–64. http://dx.doi.org/10.1007/bf00403768.
Full textAggarwal, Alankrita, Kanwalvir Singh Dhindsa, and P. K. Suri. "A Pragmatic Assessment of Approaches and Paradigms in Software Risk Management Frameworks." International Journal of Natural Computing Research 9, no. 1 (January 2020): 13–26. http://dx.doi.org/10.4018/ijncr.2020010102.
Full textMarx, Ben, and Deon Oosthuizen. "Risk assessment and mitigation at the information technology companies." Risk Governance and Control: Financial Markets and Institutions 6, no. 2 (2016): 44–51. http://dx.doi.org/10.22495/rcgv6i2art6.
Full textSCHNEIDEWIND, NORMAN. "APPLYING NEURAL NETWORKS TO SOFTWARE RELIABILITY ASSESSMENT." International Journal of Reliability, Quality and Safety Engineering 17, no. 04 (August 2010): 313–29. http://dx.doi.org/10.1142/s0218539310003834.
Full textAl-Rousan, Thamer. "Cloud Computing for Global Software Development." International Journal of Cloud Applications and Computing 5, no. 1 (January 2015): 58–68. http://dx.doi.org/10.4018/ijcac.2015010105.
Full textPradhan, Padma Lochan. "Proposed Round Robin CIA Pattern on RTS for Risk Assessment." International Journal of Digital Crime and Forensics 9, no. 1 (January 2017): 71–85. http://dx.doi.org/10.4018/ijdcf.2017010105.
Full textThanwadee T. Sunetnanta, and Morakot Choetkiertikul. "Quantitative CMMI Assessment for Software Process Quality and Risk Monitoring in Software Process Improvement." International Journal of Digital Content Technology and its Applications 6, no. 21 (November 30, 2012): 95–102. http://dx.doi.org/10.4156/jdcta.vol6.issue21.11.
Full textGarvey, P. R., D. J. Phair, and J. A. Wilson. "An Information Architecture For Risk Assessment And Management." IEEE Software 14, no. 3 (May 1997): 25–34. http://dx.doi.org/10.1109/ms.1997.589228.
Full textBouquegneau, Christian. "The Risk Multilingual 3 Software: Applying the New Trends in Lightning Risk Assessment." Journal of Lightning Research 4, no. 1 (July 13, 2012): 129–32. http://dx.doi.org/10.2174/1652803401204010129.
Full textJimoh, Rasheed Gbenga, Olayinka Olufunmilayo Olusanya, Joseph Bamidele Awotunde, Agbotiname Lucky Imoize, and Cheng-Chi Lee. "Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases." Future Internet 14, no. 11 (October 26, 2022): 305. http://dx.doi.org/10.3390/fi14110305.
Full text