Artículos de revistas sobre el tema "Software risk mitigation"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Software risk mitigation".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Mittal, Sonam. "Risk Analysis and Mitigation Steps in Different Phases of Software Development". International Journal of Scientific Research 2, n.º 6 (1 de junio de 2012): 241–43. http://dx.doi.org/10.15373/22778179/june2013/77.
Texto completoRahman, Tania, Shanto Kumar Saha, Md Sajjadur Rahman Sohel, Md Tamim Maula, Abhijit Bowmik y Rashidul Hasan Nabil. "Risk Identification and Analysis in Software Development in Bangladesh IT Industry: A Hybrid Model". AIUB Journal of Science and Engineering (AJSE) 21, n.º 1 (12 de mayo de 2022): 37–44. http://dx.doi.org/10.53799/ajse.v21i1.308.
Texto completoVerner, J. M., O. P. Brereton, B. A. Kitchenham, M. Turner y M. Niazi. "Risks and risk mitigation in global software development: A tertiary study". Information and Software Technology 56, n.º 1 (enero de 2014): 54–78. http://dx.doi.org/10.1016/j.infsof.2013.06.005.
Texto completo., S. Rehman. "SOFTWARE SECURITY RISK MITIGATION USING OBJECT ORIENTED DESIGN PATTERNS". International Journal of Research in Engineering and Technology 02, n.º 07 (25 de julio de 2013): 71–89. http://dx.doi.org/10.15623/ijret.2013.0207010.
Texto completoFrydman, Maxime, Guifré Ruiz, Elisa Heymann, Eduardo César y Barton P. Miller. "Automating Risk Analysis of Software Design Models". Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/805856.
Texto completoTaylor, David, Derek Williamson, Harprit Kaur, Kevin Macintosh, Leo Brewster y Ramon Roach. "BARBADOS NATIONAL COASTAL RISK INFORMATION AND PLANNING PLATFORM A SOFTWARE SYSTEM FOR HAZARDS, VULNERABILITY & RISK". Coastal Engineering Proceedings, n.º 36 (30 de diciembre de 2018): 55. http://dx.doi.org/10.9753/icce.v36.risk.55.
Texto completoMarx, Ben y Deon Oosthuizen. "Risk assessment and mitigation at the information technology companies". Risk Governance and Control: Financial Markets and Institutions 6, n.º 2 (2016): 44–51. http://dx.doi.org/10.22495/rcgv6i2art6.
Texto completoYan, Shujie, Liangzhu (Leon) Wang, Michael J. Birnkrant, Zhiqiang (John) Zhai y Shelly L. Miller. "Multizone Modeling of Airborne SARS-CoV-2 Quanta Transmission and Infection Mitigation Strategies in Office, Hotel, Retail, and School Buildings". Buildings 13, n.º 1 (31 de diciembre de 2022): 102. http://dx.doi.org/10.3390/buildings13010102.
Texto completoBiro, Miklos, Atif Mashkoor, Johannes Sametinger y Remzi Seker. "Software Safety and Security Risk Mitigation in Cyber-physical Systems". IEEE Software 35, n.º 1 (enero de 2018): 24–29. http://dx.doi.org/10.1109/ms.2017.4541050.
Texto completoHasni, Mohamed S. M. y Turhan Köprübaşı. "Controlling Task Dependency as a Risk Mitigation Process". International Journal of Emerging Research in Management and Technology 6, n.º 11 (13 de junio de 2018): 19. http://dx.doi.org/10.23956/ijermt.v6i11.42.
Texto completoCardan, Rex A., Elizabeth L. Covington y Richard A. Popple. "Code Wisely: Risk assessment and mitigation for custom clinical software". Journal of Applied Clinical Medical Physics 22, n.º 8 (10 de julio de 2021): 273–79. http://dx.doi.org/10.1002/acm2.13348.
Texto completoAnthony Jnr, Bokolo, Noraini Che Pa, Rozi Nor Haizan Nor y Yusmadi Jah Josoh. "KNOWLEDGE MAPPING PROCESS MODEL FOR RISK MITIGATION IN SOFTWARE MANAGEMENT". International Journal of Software Engineering and Computer Systems 3 (28 de febrero de 2017): 1–16. http://dx.doi.org/10.15282/ijsecs.3.2017.1.0023.
Texto completoGefen, Wyss y Lichtenstein. "Business Familiarity as Risk Mitigation in Software Development Outsourcing Contracts". MIS Quarterly 32, n.º 3 (2008): 531. http://dx.doi.org/10.2307/25148855.
Texto completoVarnell-Sarjeant, Julia F. "Managing a man-rated software development program via risk mitigation". ACM SIGSOFT Software Engineering Notes 33, n.º 4 (julio de 2008): 1–8. http://dx.doi.org/10.1145/1384139.1384147.
Texto completoMalik, Vinita y Sukhdip Singh. "An Artificially Intelligent Algorithmic Paradigm for Risk Mitigation in Risk Managed Software Testing". Journal of Data Processing 8, n.º 3 (1 de septiembre de 2018): 100. http://dx.doi.org/10.6025/jdp/2018/8/3/100-105.
Texto completoBiswas, Baidyanath y Arunabha Mukhopadhyay. "G-RAM framework for software risk assessment and mitigation strategies in organisations". Journal of Enterprise Information Management 31, n.º 2 (5 de marzo de 2018): 276–99. http://dx.doi.org/10.1108/jeim-05-2017-0069.
Texto completoAlfarisi, Salman y Nico Surantha. "Risk assessment in fleet management system using OCTAVE allegro". Bulletin of Electrical Engineering and Informatics 11, n.º 1 (1 de febrero de 2022): 530–40. http://dx.doi.org/10.11591/eei.v11i1.3241.
Texto completoFirdose, Salma y L. Manjunath Rao. "3LRM-3 Layer Risk Mitigation Modelling of ICT Software Development Projects". International Journal of Electrical and Computer Engineering (IJECE) 6, n.º 1 (1 de febrero de 2016): 349. http://dx.doi.org/10.11591/ijece.v6i1.9026.
Texto completoFirdose, Salma y L. Manjunath Rao. "3LRM-3 Layer Risk Mitigation Modelling of ICT Software Development Projects". International Journal of Electrical and Computer Engineering (IJECE) 6, n.º 1 (1 de febrero de 2016): 349. http://dx.doi.org/10.11591/ijece.v6i1.pp349-356.
Texto completoPatil, Shruti y Roshani Ade. "A Global Software Engineering Knowledge Management Approach for Intensive Risk Mitigation". International Journal of Managing Public Sector Information and Communication Technologies 6, n.º 1 (31 de marzo de 2015): 01–08. http://dx.doi.org/10.5121/ijmpict.2015.6101.
Texto completoAbdul-Rahman, Hamzah, Faizul Azli Mohd-Rahim y Wang Chen. "Reducing failures in software development projects: effectiveness of risk mitigation strategies". Journal of Risk Research 15, n.º 4 (abril de 2012): 417–33. http://dx.doi.org/10.1080/13669877.2011.634520.
Texto completoPutra, Yanuar Dharma y Imron Mawardi. "ELIMINASI RISIKO OPERASIONAL BMT SRI SEJAHTERA SURABAYA". Jurnal Ekonomi Syariah Teori dan Terapan 6, n.º 7 (17 de enero de 2020): 1317. http://dx.doi.org/10.20473/vol6iss20197pp1317-1330.
Texto completoIMADE, Odaro S. y Faith I. AKINNIBOSUN. "The risk mitigation indices associated with some risk mitigation protocols performed on contaminated aqua-cultured catfish (Clarias gariepinus)". Notulae Scientia Biologicae 12, n.º 1 (31 de marzo de 2020): 172–83. http://dx.doi.org/10.15835/nsb12110633.
Texto completoHermawan, I., I. Suhendra, H. Wiranata, R. W. Karim, A. W. Astuti, B. Silaen y D. E. Wicaksono. "Disaster and Risk Mitigation at The Toll Road Planning Stage". IOP Conference Series: Earth and Environmental Science 936, n.º 1 (1 de diciembre de 2021): 012016. http://dx.doi.org/10.1088/1755-1315/936/1/012016.
Texto completoDittmann, Kjeld y Mogens Blanke. "Risk mitigation by design of autonomous maritime automation systems". at - Automatisierungstechnik 70, n.º 5 (1 de mayo de 2022): 469–81. http://dx.doi.org/10.1515/auto-2021-0151.
Texto completoMubin, Sajjad, Shah Jahan y Ekaterina Gavrishyk. "Monte Carlo Simulation and Modeling of Schedule, Cost and Risks of Dasu Hydropower Project". July 2019 38, n.º 3 (1 de julio de 2019): 557–70. http://dx.doi.org/10.22581/muet1982.1903.03.
Texto completoUmar, Rusydi, Imam Riadi y Ridho Surya Kusuma. "Mitigating Sodinokibi Ransomware Attack on Cloud Network Using Software-Defined Networking (SDN)". International Journal of Safety and Security Engineering 11, n.º 3 (30 de junio de 2021): 239–46. http://dx.doi.org/10.18280/ijsse.110304.
Texto completoChang, Chia-Hsun, Jingjing Xu, Jingxin Dong y Zaili Yang. "Selection of effective risk mitigation strategies in container shipping operations". Maritime Business Review 4, n.º 4 (18 de noviembre de 2019): 413–31. http://dx.doi.org/10.1108/mabr-04-2019-0013.
Texto completoAbbas, Haider Muhi, Basel Halak y Mark Zwolinski. "BTI mitigation by anti-ageing software patterns". Microelectronics Reliability 79 (diciembre de 2017): 79–90. http://dx.doi.org/10.1016/j.microrel.2017.10.009.
Texto completoPalupi, Ghea Sekar, Paramitha Nerisafitra y Rahadian Bisma. "How Information Literacy Influences Student’s Online Risk Mitigation". Journal of Information Engineering and Educational Technology 6, n.º 2 (24 de diciembre de 2022): 42–49. http://dx.doi.org/10.26740/jieet.v6n2.p42-49.
Texto completoShahzad, Basit, Fazal-e-Amin, Ahsanullah Abro, Muhammad Imran y Muhammad Shoaib. "Resource Optimization-Based Software Risk Reduction Model for Large-Scale Application Development". Sustainability 13, n.º 5 (1 de marzo de 2021): 2602. http://dx.doi.org/10.3390/su13052602.
Texto completoSalin, Hannes y Martin Lundgren. "Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams". Journal of Cybersecurity and Privacy 2, n.º 2 (13 de abril de 2022): 276–91. http://dx.doi.org/10.3390/jcp2020015.
Texto completoLOBATO, LUANNA LOPES, THIAGO JABUR BITTAR, PAULO ANSELMO DA MOTA SILVEIRA NETO, IVAN DO CARMO MACHADO, EDUARDO SANTANA DE ALMEIDA y SILVIO ROMERO DE LEMOS MEIRA. "RISK MANAGEMENT IN SOFTWARE PRODUCT LINE ENGINEERING: A MAPPING STUDY". International Journal of Software Engineering and Knowledge Engineering 23, n.º 04 (mayo de 2013): 523–58. http://dx.doi.org/10.1142/s0218194013500150.
Texto completoZheng, Zheng y Kishor S. Trivedi. "Guest editorial: special issue on modeling and mitigation techniques for software aging". Software Quality Journal 28, n.º 1 (26 de febrero de 2020): 3–5. http://dx.doi.org/10.1007/s11219-020-09496-0.
Texto completoRao, Aakarsh, Nadir A. Carreón, Roman Lysecky y Jerzy Rozenblit. "FIRE: A Finely Integrated Risk Evaluation Methodology for Life-Critical Embedded Systems". Information 13, n.º 10 (10 de octubre de 2022): 487. http://dx.doi.org/10.3390/info13100487.
Texto completoKumar, Sameer, Anthony Kwong y Chandan Misra. "Risk mitigation in offshoring of business operations". Journal of Manufacturing Technology Management 20, n.º 4 (mayo de 2009): 442–59. http://dx.doi.org/10.1108/17410380910953711.
Texto completoKassem, Yousseuf, Hüseyin Gökçekuş y Nour Alijl. "Flash flood risk assessment modelling and methods: Kyrenia Region, Northern Cyprus". World Journal of Environmental Research 11, n.º 1 (16 de mayo de 2022): 42–52. http://dx.doi.org/10.18844/wjer.v11i1.7190.
Texto completoMathew, Saji K. y Yuanyuan Chen. "Achieving offshore software development success: An empirical analysis of risk mitigation through relational norms". Journal of Strategic Information Systems 22, n.º 4 (diciembre de 2013): 298–314. http://dx.doi.org/10.1016/j.jsis.2013.03.001.
Texto completoMunang, Aswan y Isnaini Nurisusilawati. "Modeling Underlying Pattern Making Construction Safety Risk Mitigation Decisions Using Dynamic Systems". Jurnal Ilmiah Teknik Industri 21, n.º 1 (30 de junio de 2022): 37–48. http://dx.doi.org/10.23917/jiti.v21i1.17429.
Texto completoRahayu, Flourensia Sapty, Toni Indrawan y Shafinah Kamarudin. "Risk Mitigation Strategies in Implementing Scrum Framework for Internet-Based IT Companies in Indonesia". Indonesian Journal of Information Systems 3, n.º 1 (27 de agosto de 2020): 50. http://dx.doi.org/10.24002/ijis.v3i1.3589.
Texto completoKavallieratos, Georgios, Christos Grigoriadis, Angeliki Katsika, Georgios Spathoulas, Panayiotis Kotzanikolaou y Sokratis Katsikas. "Risk assessment and control selection for cyber-physical systems: a case study on supply chain tracking systems". Journal of Surveillance, Security and Safety 3, n.º 4 (2022): 128–49. http://dx.doi.org/10.20517/jsss.2022.17.
Texto completoHardiyanto, Yovi. "CENGKLIK RESERVOIR PERFORMANCE ON DROUGHT MITIGATION". Journal of the Civil Engineering Forum 1, n.º 2 (16 de julio de 2017): 69. http://dx.doi.org/10.22146/jcef.24000.
Texto completoShareef, Mohammad Esam y Dheyaa Ghanim Abdulrazzaq. "River Flood Modelling For Flooding Risk Mitigation in Iraq". Civil Engineering Journal 7, n.º 10 (1 de octubre de 2021): 1702–15. http://dx.doi.org/10.28991/cej-2021-03091754.
Texto completoOlaiya, Kehinde, Kareem Arikewuyo, Ashim Shogunro y Lateef Yunusa. "Effect of Risk Mitigation on Profitability of Insurance Industries in Nigeria". Izvestiya Journal of the University of Economics - Varna 65, n.º 3 (8 de noviembre de 2021): 330–43. http://dx.doi.org/10.36997/ijuev2021.65.3.330.
Texto completoSrivanit, Manat. "Community Risk Assessment: Spatial Patterns and GIS-Based Model for Fire Risk Assessment - A Case Study of Chiang Mai Municipality". Journal of Architectural/Planning Research and Studies (JARS) 8, n.º 2 (3 de septiembre de 2018): 113–26. http://dx.doi.org/10.56261/jars.v8i2.168615.
Texto completoHuong Tran, Thi Thanh, Paul Childerhouse y Eric Deakins. "Supply chain information sharing: challenges and risk mitigation strategies". Journal of Manufacturing Technology Management 27, n.º 8 (3 de octubre de 2016): 1102–26. http://dx.doi.org/10.1108/jmtm-03-2016-0033.
Texto completoSteimers, André y Moritz Schneider. "Sources of Risk of AI Systems". International Journal of Environmental Research and Public Health 19, n.º 6 (18 de marzo de 2022): 3641. http://dx.doi.org/10.3390/ijerph19063641.
Texto completoHarahap, Rudy M., Andri Setiawan, Adi Subakti Kurniawan y Merlin Mulia. "PENGUKURAN RISIKO PROYEK PADA PERUSAHAAN TEKNOLOGI INFORMASI DI INDONESIA". CommIT (Communication and Information Technology) Journal 3, n.º 2 (31 de octubre de 2009): 70. http://dx.doi.org/10.21512/commit.v3i2.517.
Texto completoLuxton, Abigail y Marin Marinov. "Terrorist Threat Mitigation Strategies for the Railways". Sustainability 12, n.º 8 (22 de abril de 2020): 3408. http://dx.doi.org/10.3390/su12083408.
Texto completoBrooke, Phil y Richard Paige. "User-visible cryptography in email and web scenarios". Information & Computer Security 23, n.º 1 (9 de marzo de 2015): 58–72. http://dx.doi.org/10.1108/ics-07-2013-0054.
Texto completo