Literatura académica sobre el tema "Software risk mitigation"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Software risk mitigation".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Software risk mitigation"
Mittal, Sonam. "Risk Analysis and Mitigation Steps in Different Phases of Software Development". International Journal of Scientific Research 2, n.º 6 (1 de junio de 2012): 241–43. http://dx.doi.org/10.15373/22778179/june2013/77.
Texto completoRahman, Tania, Shanto Kumar Saha, Md Sajjadur Rahman Sohel, Md Tamim Maula, Abhijit Bowmik y Rashidul Hasan Nabil. "Risk Identification and Analysis in Software Development in Bangladesh IT Industry: A Hybrid Model". AIUB Journal of Science and Engineering (AJSE) 21, n.º 1 (12 de mayo de 2022): 37–44. http://dx.doi.org/10.53799/ajse.v21i1.308.
Texto completoVerner, J. M., O. P. Brereton, B. A. Kitchenham, M. Turner y M. Niazi. "Risks and risk mitigation in global software development: A tertiary study". Information and Software Technology 56, n.º 1 (enero de 2014): 54–78. http://dx.doi.org/10.1016/j.infsof.2013.06.005.
Texto completo., S. Rehman. "SOFTWARE SECURITY RISK MITIGATION USING OBJECT ORIENTED DESIGN PATTERNS". International Journal of Research in Engineering and Technology 02, n.º 07 (25 de julio de 2013): 71–89. http://dx.doi.org/10.15623/ijret.2013.0207010.
Texto completoFrydman, Maxime, Guifré Ruiz, Elisa Heymann, Eduardo César y Barton P. Miller. "Automating Risk Analysis of Software Design Models". Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/805856.
Texto completoTaylor, David, Derek Williamson, Harprit Kaur, Kevin Macintosh, Leo Brewster y Ramon Roach. "BARBADOS NATIONAL COASTAL RISK INFORMATION AND PLANNING PLATFORM A SOFTWARE SYSTEM FOR HAZARDS, VULNERABILITY & RISK". Coastal Engineering Proceedings, n.º 36 (30 de diciembre de 2018): 55. http://dx.doi.org/10.9753/icce.v36.risk.55.
Texto completoMarx, Ben y Deon Oosthuizen. "Risk assessment and mitigation at the information technology companies". Risk Governance and Control: Financial Markets and Institutions 6, n.º 2 (2016): 44–51. http://dx.doi.org/10.22495/rcgv6i2art6.
Texto completoYan, Shujie, Liangzhu (Leon) Wang, Michael J. Birnkrant, Zhiqiang (John) Zhai y Shelly L. Miller. "Multizone Modeling of Airborne SARS-CoV-2 Quanta Transmission and Infection Mitigation Strategies in Office, Hotel, Retail, and School Buildings". Buildings 13, n.º 1 (31 de diciembre de 2022): 102. http://dx.doi.org/10.3390/buildings13010102.
Texto completoBiro, Miklos, Atif Mashkoor, Johannes Sametinger y Remzi Seker. "Software Safety and Security Risk Mitigation in Cyber-physical Systems". IEEE Software 35, n.º 1 (enero de 2018): 24–29. http://dx.doi.org/10.1109/ms.2017.4541050.
Texto completoHasni, Mohamed S. M. y Turhan Köprübaşı. "Controlling Task Dependency as a Risk Mitigation Process". International Journal of Emerging Research in Management and Technology 6, n.º 11 (13 de junio de 2018): 19. http://dx.doi.org/10.23956/ijermt.v6i11.42.
Texto completoTesis sobre el tema "Software risk mitigation"
Rode, Karl. "Using risk mitigation approaches to define the requirements for software escrow". Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017936.
Texto completoLicorish, Sherlock Anthony. "Tool support for social risk mitigation in agile projects a thesis submitted in partial fulfilment of the degree of Master of Computer and Information Sciences (MCIS) at the Auckland University of Technology, Auckland, June 2007 /". Click here to access this resource online, 2007. http://repositoryaut.lconz.ac.nz/theses/1354/.
Texto completoPrimary supervisor: Anne Philpott. Co-supervisor: Professor Stephen MacDonell. Includes bibliographical references. Also held in print (x, 147 leaves : ill. ; 30 cm.) in City Campus Theses Collection (T 005.12 LIC)
Ginn, Robert C. "A software assurance framework for mitigating the risks of malicious software in embedded systems used in aircraft". Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5593.
Texto completotechniques that can be used to detect malicious code in individual aircraft Weapons Replaceable Assemblies (WRAs)
risks and mitigation strategies related to a generic aircraft software development process
system level techniques to prevent embedded malicious software from causing harm in aircraft
and a technique for documenting Software Assurance (SwA) arguments being made about the system and the individual WRAs.
Malicious software represents a significant and growing threat to Defense systems. Threats to airborne systems in particular can be characterized not by system vulnerability to Internet based exploits but rather by the risk posed by malicious code already present in the system's software. Although there are software techniques to detect and prevent certain types of attacks, a Systems Engineer has access to system level information and system design techniques that can quantify and in many cases mitigate the risks posed by potential malicious code present in the system. These techniques are especially applicable to malicious code in embedded airborne system although they can be applied to other systems that share certain traits. This thesis provides an overview of the types of threat involved
Denys, Paul. "Security of Personal Information in Cloud Computing : Identifying and mitigating against risks to privacy in the deployment of Enterprise Systems Applications on the Software as a Service platform". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5726.
Texto completoLibros sobre el tema "Software risk mitigation"
Polydys, Mary Linda. Software assurance in acquisition: Mitigating risks to the enterprise : a reference guide for security-enhanced software acquisition and outsourcing. Washington, D.C: National Defense University Press, 2009.
Buscar texto completoAnalyzing the Role of Risk Mitigation and Monitoring in Software Development. IGI Global, 2018.
Buscar texto completoKieras, Tim, Quanyan Zhu y Junaid Farooq. IoT Supply Chain Security Risk Analysis and Mitigation: Modeling, Computations, and Software Tools. Springer International Publishing AG, 2022.
Buscar texto completoFalco, Gregory J. y Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Texto completoCapítulos de libros sobre el tema "Software risk mitigation"
Podari, Zuriyaninatasa, Adila Firdaus Arbain, Noraini Ibrahim y Endah Sudarmilah. "Risk Mitigation Framework for Agile Global Software Development". En Lecture Notes on Data Engineering and Communications Technologies, 1233–46. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70713-2_110.
Texto completoZhou, Peng y Hareton K. N. Leung. "Strategies for Scheduling Risk Mitigation in Software Project Management". En Communications in Computer and Information Science, 3–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45943-0_1.
Texto completoArbain, Adila Firdaus, Muhammad Akil Rafeek, Zuriyaninatasa Podari y Cik Feresa Mohd Foozy. "Measuring Risk Mitigation Techniques in Agile Global Software Development". En Lecture Notes on Data Engineering and Communications Technologies, 1225–32. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70713-2_109.
Texto completoRegano, Leonardo, Daniele Canavese, Cataldo Basile, Alessio Viticchié y Antonio Lioy. "Towards Automatic Risk Analysis and Mitigation of Software Applications". En Information Security Theory and Practice, 120–35. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45931-8_8.
Texto completoHauge, Øyvind, Daniela Soares Cruzes, Reidar Conradi, Ketil Sandanger Velle y Tron André Skarpenes. "Risks and Risk Mitigation in Open Source Software Adoption: Bridging the Gap between Literature and Practice". En IFIP Advances in Information and Communication Technology, 105–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13244-5_9.
Texto completoChadli, Saad Yasser y Ali Idri. "A Survey on the Impact of Risk Factors and Mitigation Strategies in Global Software Development". En Advances in Intelligent Systems and Computing, 408–17. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77712-2_39.
Texto completoSeyff, Norbert. "Mitigating Risks in Mobile System Development". En Extreme Programming and Agile Processes in Software Engineering, 437–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44870-5_75.
Texto completoStephansen, Cathrine, Anders Bjørgesæter, Odd Willy Brude, Ute Brönner, Tonje Waterloo Rogstad, Grethe Kjeilen-Eilertsen, Jean-Marie Libre y Christian Collin-Hansen. "Environmental Risk Management Applications of ERA Acute". En Assessing Environmental Risk of Oil Spills with ERA Acute, 21–31. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70176-5_2.
Texto completo"Risk Assessment and Risk Mitigation Activities in the SDLC". En Security Software Development, 235–50. Auerbach Publications, 2008. http://dx.doi.org/10.1201/9781420063813-12.
Texto completo"Risk Assessment and Risk Mitigation Activities in the SDLC". En Security Software Development, 217–32. Auerbach Publications, 2008. http://dx.doi.org/10.1201/9781420063813.ch8.
Texto completoActas de conferencias sobre el tema "Software risk mitigation"
Kazmi, Syeda Hina Mazhar, Yaser Hafeez y Sadia Ali. "Software outsourcing model for risk mitigation". En 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEE, 2018. http://dx.doi.org/10.1109/icomet.2018.8346317.
Texto completo"Scheduling Strategies for Risk Mitigation". En International Conference on Software Engineering and Applications. SciTePress - Science and and Technology Publications, 2013. http://dx.doi.org/10.5220/0004409203650376.
Texto completoShahzad, Basit y Abdullah S. Al-Mudimigh. "Risk Identification, Mitigation and Avoidance Model for Handling Software Risk". En 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN 2010). IEEE, 2010. http://dx.doi.org/10.1109/cicsyn.2010.82.
Texto completoZhou, Peng y Hareton K. N. Leung. "A New Scheduling Strategy for Risk Mitigation". En 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2013. http://dx.doi.org/10.1109/apsec.2013.76.
Texto completoShahzad, Basit, Ihsan Ullah y Naveed Khan. "Software Risk Identification and Mitigation in Incremental Model". En 2009 International Conference on Information and Multimedia Technology. IEEE, 2009. http://dx.doi.org/10.1109/icimt.2009.104.
Texto completoFesas, Nestor y Donald F. Shafer. "Getting Software Risk Mitigation Right from the Start". En SPE Digital Energy Conference and Exhibition. Society of Petroleum Engineers, 2011. http://dx.doi.org/10.2118/143797-ms.
Texto completoEbert, Christof. "Supplier Performance Management: Risk Mitigation and Industry Benchmarks". En 2017 IEEE 12th International Conference on Global Software Engineering (ICGSE). IEEE, 2017. http://dx.doi.org/10.1109/icgse.2017.5.
Texto completoXu, Xiwei, Chen Wang, Zhen Wang, Qinghua Lu y Liming Zhu. "Dependency Tracking for Risk Mitigation in Machine Learning (ML) Systems". En 2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 2022. http://dx.doi.org/10.1109/icse-seip55303.2022.9794111.
Texto completoMasticola, Stephen P. "Lightweight Risk Mitigation for Software Development Projects Using Repository Mining". En Fourth International Workshop on Mining Software Repositories. IEEE, 2007. http://dx.doi.org/10.1109/msr.2007.16.
Texto completoMeslem, Abdelghani, Håvard Iversen, Dominik Lang, Tina Kaschwich, Linn Sir Drange y Keith Jones. "The LRG Software for liquefaction mitigation planning and decision support". En IABSE Symposium, Guimarães 2019: Towards a Resilient Built Environment Risk and Asset Management. Zurich, Switzerland: International Association for Bridge and Structural Engineering (IABSE), 2019. http://dx.doi.org/10.2749/guimaraes.2019.1681.
Texto completoInformes sobre el tema "Software risk mitigation"
Dodson, Donna, Murugiah Souppaya y Karen Scarfone. Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF). National Institute of Standards and Technology, abril de 2020. http://dx.doi.org/10.6028/nist.cswp.04232020.
Texto completoDodson, Donna. Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF). Gaithersburg, MD: National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.cswp.13.
Texto completoPolydys, Mary L. y Stan Wisseman. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing. Fort Belvoir, VA: Defense Technical Information Center, febrero de 2009. http://dx.doi.org/10.21236/ada495389.
Texto completo