{"id":"https://openalex.org/W2553939890","doi":"https://doi.org/10.1109/apnoms.2016.7737238","title":"An integrated security testing framework for Secure Software Development Life Cycle","display_name":"An integrated security testing framework for Secure Software Development Life Cycle","publication_year":2016,"publication_date":"2016-10-01","ids":{"openalex":"https://openalex.org/W2553939890","doi":"https://doi.org/10.1109/apnoms.2016.7737238","mag":"2553939890"},"language":"en","primary_location":{"id":"doi:10.1109/apnoms.2016.7737238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apnoms.2016.7737238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016506783","display_name":"Yuan-Hsin Tung","orcid":null},"institutions":[{"id":"https://openalex.org/I92172085","display_name":"Chunghwa Telecom (Taiwan)","ror":"https://ror.org/04f786589","country_code":"TW","type":"company","lineage":["https://openalex.org/I92172085"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Yuan-Hsin Tung","raw_affiliation_strings":["Telecommunication Lab., Chunghwa Telecom Co., Ltd., Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"Telecommunication Lab., Chunghwa Telecom Co., Ltd., Taiwan, ROC","institution_ids":["https://openalex.org/I92172085"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018044819","display_name":"Sheng-Chen Lo","orcid":null},"institutions":[{"id":"https://openalex.org/I92172085","display_name":"Chunghwa Telecom (Taiwan)","ror":"https://ror.org/04f786589","country_code":"TW","type":"company","lineage":["https://openalex.org/I92172085"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Sheng-Chen Lo","raw_affiliation_strings":["Telecommunication Lab., Chunghwa Telecom Co., Ltd., Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"Telecommunication Lab., Chunghwa Telecom Co., Ltd., Taiwan, ROC","institution_ids":["https://openalex.org/I92172085"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003442053","display_name":"Jen-Feng Shih","orcid":null},"institutions":[{"id":"https://openalex.org/I92172085","display_name":"Chunghwa Telecom (Taiwan)","ror":"https://ror.org/04f786589","country_code":"TW","type":"company","lineage":["https://openalex.org/I92172085"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jen-Feng Shih","raw_affiliation_strings":["Telecommunication Lab., Chunghwa Telecom Co., Ltd., Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"Telecommunication Lab., Chunghwa Telecom Co., Ltd., Taiwan, ROC","institution_ids":["https://openalex.org/I92172085"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083930808","display_name":"Hung-Fu Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I92172085","display_name":"Chunghwa Telecom (Taiwan)","ror":"https://ror.org/04f786589","country_code":"TW","type":"company","lineage":["https://openalex.org/I92172085"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hung-Fu Lin","raw_affiliation_strings":["Telecommunication Lab., Chunghwa Telecom Co., Ltd., Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"Telecommunication Lab., Chunghwa Telecom Co., Ltd., Taiwan, ROC","institution_ids":["https://openalex.org/I92172085"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016506783"],"corresponding_institution_ids":["https://openalex.org/I92172085"],"apc_list":null,"apc_paid":null,"fwci":1.2609,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.81588663,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/systems-development-life-cycle","display_name":"Systems development life cycle","score":0.7669128179550171},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.7663415670394897},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.7361752390861511},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7083995342254639},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5840058922767639},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.546796977519989},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5177758932113647},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5171477198600769},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4973583519458771},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.47559985518455505},{"id":"https://openalex.org/keywords/software-development-process","display_name":"Software development process","score":0.46870630979537964},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.4144097566604614},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3817526698112488},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.35981523990631104},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3207377791404724},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.26897555589675903},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11794236302375793},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.10642409324645996}],"concepts":[{"id":"https://openalex.org/C120617098","wikidata":"https://www.wikidata.org/wiki/Q559486","display_name":"Systems development life cycle","level":5,"score":0.7669128179550171},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.7663415670394897},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.7361752390861511},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7083995342254639},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5840058922767639},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.546796977519989},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5177758932113647},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5171477198600769},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4973583519458771},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.47559985518455505},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.46870630979537964},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.4144097566604614},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3817526698112488},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.35981523990631104},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3207377791404724},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26897555589675903},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11794236302375793},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10642409324645996}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apnoms.2016.7737238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apnoms.2016.7737238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1645120341","https://openalex.org/W1989449504","https://openalex.org/W2000967019","https://openalex.org/W2093677326","https://openalex.org/W2096134561","https://openalex.org/W2156221105","https://openalex.org/W2912955126"],"related_works":["https://openalex.org/W2155353733","https://openalex.org/W2170847850","https://openalex.org/W2062583373","https://openalex.org/W1566131087","https://openalex.org/W2101186143","https://openalex.org/W47727947","https://openalex.org/W4240401768","https://openalex.org/W2018644264","https://openalex.org/W2553939890","https://openalex.org/W4313307479"],"abstract_inverted_index":{"Hundreds":[0],"of":[1,34,40,47,90,113,118,133,150],"vulnerabilities":[2],"and":[3,11,42,88,109,143,174],"security":[4,19,23,32,59,71,86,94,99,140],"defects":[5],"are":[6],"disclosed":[7],"by":[8,130],"hackers,":[9],"developers,":[10],"users.":[12],"The":[13,164],"better":[14],"way":[15],"to":[16,21,44,51,56,92,105,115,157],"improve":[17,57,116],"software":[18,30,58,76,161],"is":[20,60],"enhance":[22],"process":[24,37],"into":[25],"SDLC":[26,36],"processes.":[27],"To":[28,120],"keep":[29],"secure,":[31],"enhancement":[33],"the":[35,127],"involves":[38],"lots":[39],"practices":[41,89],"activities":[43,54,87,146],"achieve":[45],"goal":[46],"security.":[48],"However,":[49],"how":[50],"adopt":[52],"these":[53],"well":[55],"an":[61,69],"important":[62],"problem.":[63],"In":[64,80],"this":[65],"paper,":[66],"we":[67,84,97,125],"propose":[68],"integrated":[70],"testing":[72,100,107,111,141],"framework":[73],"for":[74],"secure":[75,145],"development":[77],"life":[78],"cycle.":[79],"our":[81,122,155,168],"proposed":[82,123],"framework,":[83,124],"apply":[85],"SSDLC":[91],"generate":[93],"guidelines.":[95],"Furthermore,":[96],"integrate":[98,138],"tools":[101,114,142],"as":[102],"a":[103],"platform":[104],"provide":[106,172],"service":[108],"converge":[110],"results":[112,165],"accurate":[117],"test.":[119],"evaluate":[121],"construct":[126],"prototype":[128,169],"system":[129,136,156,170],"referring":[131],"phases":[132],"framework.":[134],"Our":[135],"can":[137,171],"various":[139],"support":[144],"in":[147],"each":[148],"phase":[149],"SSDLC.":[151],"We":[152],"had":[153],"applied":[154],"at":[158],"least":[159],"50":[160],"developing":[162],"projects.":[163],"indicate":[166],"that":[167],"quality":[173],"stable":[175],"service.":[176]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
