2018
DOI: 10.1016/j.infsof.2018.05.011
|View full text |Cite
|
Sign up to set email alerts
|

Mapping the field of software life cycle security metrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
33
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(34 citation statements)
references
References 7 publications
1
33
0
Order By: Relevance
“…express purpose of helping to answer the research questions at hand but can also facilitate verifiability of the procedure. A welldesigned data extraction form can even be made publicly available in conjunction with a publication (Morrison et al, 2018), to stimulate further research based on the results.…”
Section: Data Extraction and Synthesismentioning
confidence: 99%
“…express purpose of helping to answer the research questions at hand but can also facilitate verifiability of the procedure. A welldesigned data extraction form can even be made publicly available in conjunction with a publication (Morrison et al, 2018), to stimulate further research based on the results.…”
Section: Data Extraction and Synthesismentioning
confidence: 99%
“…Rahman et al [14] studied 32 publications related to infrastructure as code (IaC) [13] and observed that research in IaC was mostly focused on implementing or extending the practice of IaC. Morrison et al [17] performed a mapping study on 71 papers and reported 324 unique software life cycle security metrics. For each metric, they also identified the subject being measured, how the metric had been validated, and how the metric was used.…”
Section: Related Workmentioning
confidence: 99%
“…Our results do not support the belief that practical experience always makes a better cybersecurity expert than formal education. Still Morrison et al have a second recent survey (Morrison et al 2018), this time on security metrics and considering scientific papers, that reveals an unsatisfactory scenario for what concerns the analysis criteria of software vulnerabilities. In the survey, the authors called Incident metric the one related to vulnerabilities and found that papers could be divided in two subgroups: those that focused on quantifying vulnerabilities, a goal more difficult than it may look like (Geer 2015) and a bad inference method to evaluate risk, and those that discussed CVSS.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, we focus on vulnerability assessment as a part of the overall cybersecurity risk assessment process (ISO 2008) and the use of metrics in the security development lifecycle (Morrison et al 2018). Our overall goal is studying to what extent the overall accuracy of the assessment of software vulnerabilities according to a technical methodology depend on the assessor's background knowledge and expertise (MSc students and security professionals).…”
Section: Introductionmentioning
confidence: 99%