Academic literature on the topic 'Software risk mitigation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software risk mitigation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software risk mitigation"
Mittal, Sonam. "Risk Analysis and Mitigation Steps in Different Phases of Software Development." International Journal of Scientific Research 2, no. 6 (June 1, 2012): 241–43. http://dx.doi.org/10.15373/22778179/june2013/77.
Full textRahman, Tania, Shanto Kumar Saha, Md Sajjadur Rahman Sohel, Md Tamim Maula, Abhijit Bowmik, and Rashidul Hasan Nabil. "Risk Identification and Analysis in Software Development in Bangladesh IT Industry: A Hybrid Model." AIUB Journal of Science and Engineering (AJSE) 21, no. 1 (May 12, 2022): 37–44. http://dx.doi.org/10.53799/ajse.v21i1.308.
Full textVerner, J. M., O. P. Brereton, B. A. Kitchenham, M. Turner, and M. Niazi. "Risks and risk mitigation in global software development: A tertiary study." Information and Software Technology 56, no. 1 (January 2014): 54–78. http://dx.doi.org/10.1016/j.infsof.2013.06.005.
Full text., S. Rehman. "SOFTWARE SECURITY RISK MITIGATION USING OBJECT ORIENTED DESIGN PATTERNS." International Journal of Research in Engineering and Technology 02, no. 07 (July 25, 2013): 71–89. http://dx.doi.org/10.15623/ijret.2013.0207010.
Full textFrydman, Maxime, Guifré Ruiz, Elisa Heymann, Eduardo César, and Barton P. Miller. "Automating Risk Analysis of Software Design Models." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/805856.
Full textTaylor, David, Derek Williamson, Harprit Kaur, Kevin Macintosh, Leo Brewster, and Ramon Roach. "BARBADOS NATIONAL COASTAL RISK INFORMATION AND PLANNING PLATFORM A SOFTWARE SYSTEM FOR HAZARDS, VULNERABILITY & RISK." Coastal Engineering Proceedings, no. 36 (December 30, 2018): 55. http://dx.doi.org/10.9753/icce.v36.risk.55.
Full textMarx, Ben, and Deon Oosthuizen. "Risk assessment and mitigation at the information technology companies." Risk Governance and Control: Financial Markets and Institutions 6, no. 2 (2016): 44–51. http://dx.doi.org/10.22495/rcgv6i2art6.
Full textYan, Shujie, Liangzhu (Leon) Wang, Michael J. Birnkrant, Zhiqiang (John) Zhai, and Shelly L. Miller. "Multizone Modeling of Airborne SARS-CoV-2 Quanta Transmission and Infection Mitigation Strategies in Office, Hotel, Retail, and School Buildings." Buildings 13, no. 1 (December 31, 2022): 102. http://dx.doi.org/10.3390/buildings13010102.
Full textBiro, Miklos, Atif Mashkoor, Johannes Sametinger, and Remzi Seker. "Software Safety and Security Risk Mitigation in Cyber-physical Systems." IEEE Software 35, no. 1 (January 2018): 24–29. http://dx.doi.org/10.1109/ms.2017.4541050.
Full textHasni, Mohamed S. M., and Turhan Köprübaşı. "Controlling Task Dependency as a Risk Mitigation Process." International Journal of Emerging Research in Management and Technology 6, no. 11 (June 13, 2018): 19. http://dx.doi.org/10.23956/ijermt.v6i11.42.
Full textDissertations / Theses on the topic "Software risk mitigation"
Rode, Karl. "Using risk mitigation approaches to define the requirements for software escrow." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017936.
Full textLicorish, Sherlock Anthony. "Tool support for social risk mitigation in agile projects a thesis submitted in partial fulfilment of the degree of Master of Computer and Information Sciences (MCIS) at the Auckland University of Technology, Auckland, June 2007 /." Click here to access this resource online, 2007. http://repositoryaut.lconz.ac.nz/theses/1354/.
Full textPrimary supervisor: Anne Philpott. Co-supervisor: Professor Stephen MacDonell. Includes bibliographical references. Also held in print (x, 147 leaves : ill. ; 30 cm.) in City Campus Theses Collection (T 005.12 LIC)
Ginn, Robert C. "A software assurance framework for mitigating the risks of malicious software in embedded systems used in aircraft." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5593.
Full texttechniques that can be used to detect malicious code in individual aircraft Weapons Replaceable Assemblies (WRAs)
risks and mitigation strategies related to a generic aircraft software development process
system level techniques to prevent embedded malicious software from causing harm in aircraft
and a technique for documenting Software Assurance (SwA) arguments being made about the system and the individual WRAs.
Malicious software represents a significant and growing threat to Defense systems. Threats to airborne systems in particular can be characterized not by system vulnerability to Internet based exploits but rather by the risk posed by malicious code already present in the system's software. Although there are software techniques to detect and prevent certain types of attacks, a Systems Engineer has access to system level information and system design techniques that can quantify and in many cases mitigate the risks posed by potential malicious code present in the system. These techniques are especially applicable to malicious code in embedded airborne system although they can be applied to other systems that share certain traits. This thesis provides an overview of the types of threat involved
Denys, Paul. "Security of Personal Information in Cloud Computing : Identifying and mitigating against risks to privacy in the deployment of Enterprise Systems Applications on the Software as a Service platform." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5726.
Full textBooks on the topic "Software risk mitigation"
Polydys, Mary Linda. Software assurance in acquisition: Mitigating risks to the enterprise : a reference guide for security-enhanced software acquisition and outsourcing. Washington, D.C: National Defense University Press, 2009.
Find full textAnalyzing the Role of Risk Mitigation and Monitoring in Software Development. IGI Global, 2018.
Find full textKieras, Tim, Quanyan Zhu, and Junaid Farooq. IoT Supply Chain Security Risk Analysis and Mitigation: Modeling, Computations, and Software Tools. Springer International Publishing AG, 2022.
Find full textFalco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Full textBook chapters on the topic "Software risk mitigation"
Podari, Zuriyaninatasa, Adila Firdaus Arbain, Noraini Ibrahim, and Endah Sudarmilah. "Risk Mitigation Framework for Agile Global Software Development." In Lecture Notes on Data Engineering and Communications Technologies, 1233–46. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70713-2_110.
Full textZhou, Peng, and Hareton K. N. Leung. "Strategies for Scheduling Risk Mitigation in Software Project Management." In Communications in Computer and Information Science, 3–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45943-0_1.
Full textArbain, Adila Firdaus, Muhammad Akil Rafeek, Zuriyaninatasa Podari, and Cik Feresa Mohd Foozy. "Measuring Risk Mitigation Techniques in Agile Global Software Development." In Lecture Notes on Data Engineering and Communications Technologies, 1225–32. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70713-2_109.
Full textRegano, Leonardo, Daniele Canavese, Cataldo Basile, Alessio Viticchié, and Antonio Lioy. "Towards Automatic Risk Analysis and Mitigation of Software Applications." In Information Security Theory and Practice, 120–35. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45931-8_8.
Full textHauge, Øyvind, Daniela Soares Cruzes, Reidar Conradi, Ketil Sandanger Velle, and Tron André Skarpenes. "Risks and Risk Mitigation in Open Source Software Adoption: Bridging the Gap between Literature and Practice." In IFIP Advances in Information and Communication Technology, 105–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13244-5_9.
Full textChadli, Saad Yasser, and Ali Idri. "A Survey on the Impact of Risk Factors and Mitigation Strategies in Global Software Development." In Advances in Intelligent Systems and Computing, 408–17. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77712-2_39.
Full textSeyff, Norbert. "Mitigating Risks in Mobile System Development." In Extreme Programming and Agile Processes in Software Engineering, 437–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44870-5_75.
Full textStephansen, Cathrine, Anders Bjørgesæter, Odd Willy Brude, Ute Brönner, Tonje Waterloo Rogstad, Grethe Kjeilen-Eilertsen, Jean-Marie Libre, and Christian Collin-Hansen. "Environmental Risk Management Applications of ERA Acute." In Assessing Environmental Risk of Oil Spills with ERA Acute, 21–31. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70176-5_2.
Full text"Risk Assessment and Risk Mitigation Activities in the SDLC." In Security Software Development, 235–50. Auerbach Publications, 2008. http://dx.doi.org/10.1201/9781420063813-12.
Full text"Risk Assessment and Risk Mitigation Activities in the SDLC." In Security Software Development, 217–32. Auerbach Publications, 2008. http://dx.doi.org/10.1201/9781420063813.ch8.
Full textConference papers on the topic "Software risk mitigation"
Kazmi, Syeda Hina Mazhar, Yaser Hafeez, and Sadia Ali. "Software outsourcing model for risk mitigation." In 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEE, 2018. http://dx.doi.org/10.1109/icomet.2018.8346317.
Full text"Scheduling Strategies for Risk Mitigation." In International Conference on Software Engineering and Applications. SciTePress - Science and and Technology Publications, 2013. http://dx.doi.org/10.5220/0004409203650376.
Full textShahzad, Basit, and Abdullah S. Al-Mudimigh. "Risk Identification, Mitigation and Avoidance Model for Handling Software Risk." In 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN 2010). IEEE, 2010. http://dx.doi.org/10.1109/cicsyn.2010.82.
Full textZhou, Peng, and Hareton K. N. Leung. "A New Scheduling Strategy for Risk Mitigation." In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2013. http://dx.doi.org/10.1109/apsec.2013.76.
Full textShahzad, Basit, Ihsan Ullah, and Naveed Khan. "Software Risk Identification and Mitigation in Incremental Model." In 2009 International Conference on Information and Multimedia Technology. IEEE, 2009. http://dx.doi.org/10.1109/icimt.2009.104.
Full textFesas, Nestor, and Donald F. Shafer. "Getting Software Risk Mitigation Right from the Start." In SPE Digital Energy Conference and Exhibition. Society of Petroleum Engineers, 2011. http://dx.doi.org/10.2118/143797-ms.
Full textEbert, Christof. "Supplier Performance Management: Risk Mitigation and Industry Benchmarks." In 2017 IEEE 12th International Conference on Global Software Engineering (ICGSE). IEEE, 2017. http://dx.doi.org/10.1109/icgse.2017.5.
Full textXu, Xiwei, Chen Wang, Zhen Wang, Qinghua Lu, and Liming Zhu. "Dependency Tracking for Risk Mitigation in Machine Learning (ML) Systems." In 2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 2022. http://dx.doi.org/10.1109/icse-seip55303.2022.9794111.
Full textMasticola, Stephen P. "Lightweight Risk Mitigation for Software Development Projects Using Repository Mining." In Fourth International Workshop on Mining Software Repositories. IEEE, 2007. http://dx.doi.org/10.1109/msr.2007.16.
Full textMeslem, Abdelghani, Håvard Iversen, Dominik Lang, Tina Kaschwich, Linn Sir Drange, and Keith Jones. "The LRG Software for liquefaction mitigation planning and decision support." In IABSE Symposium, Guimarães 2019: Towards a Resilient Built Environment Risk and Asset Management. Zurich, Switzerland: International Association for Bridge and Structural Engineering (IABSE), 2019. http://dx.doi.org/10.2749/guimaraes.2019.1681.
Full textReports on the topic "Software risk mitigation"
Dodson, Donna, Murugiah Souppaya, and Karen Scarfone. Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF). National Institute of Standards and Technology, April 2020. http://dx.doi.org/10.6028/nist.cswp.04232020.
Full textDodson, Donna. Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF). Gaithersburg, MD: National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.cswp.13.
Full textPolydys, Mary L., and Stan Wisseman. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing. Fort Belvoir, VA: Defense Technical Information Center, February 2009. http://dx.doi.org/10.21236/ada495389.
Full text