Asia-Pacific World Congress on Computer Science and Engineering 2014
DOI: 10.1109/apwccse.2014.7053838
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating artificial intelligence technique into DSDM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Villamizar et al [22] identified approaches for handling security in ASD that introduce artifacts such as abuser story, present approach for integrating security in Scrum, methods such as NORMAP [S48], and NERV [S42], and NORMATIC tool [S48, S50], and guidelines for eliciting and documenting QRs [S132, 156], that are included in our findings. They also reported a way for mapping security activities into Dynamic System Development Method (DSDM) [67] that was not found in our study. We also found strategies such as Secure Feature Driven Development (SFDD) [S54], and CIViT [S96] models, method to integrate security in feature driven development [S58], and tagging approach to elicit security in ASD [S121], and practices of security oriented TDD [S95] that were not reported in their study.…”
Section: Related Workmentioning
confidence: 64%
“…Villamizar et al [22] identified approaches for handling security in ASD that introduce artifacts such as abuser story, present approach for integrating security in Scrum, methods such as NORMAP [S48], and NERV [S42], and NORMATIC tool [S48, S50], and guidelines for eliciting and documenting QRs [S132, 156], that are included in our findings. They also reported a way for mapping security activities into Dynamic System Development Method (DSDM) [67] that was not found in our study. We also found strategies such as Secure Feature Driven Development (SFDD) [S54], and CIViT [S96] models, method to integrate security in feature driven development [S58], and tagging approach to elicit security in ASD [S121], and practices of security oriented TDD [S95] that were not reported in their study.…”
Section: Related Workmentioning
confidence: 64%
“…DSDM has been criticized when using alone since it lacks to security practices in its stages. CBR-DSDM model had been built to cover the security issues for a whole development life cycle of DSDM stages [63].…”
Section: ) Intelligent Transportation Systems (Its)mentioning
confidence: 99%