{"id":"https://openalex.org/W2967621780","doi":"https://doi.org/10.1145/3330204.3330257","title":"Vulnerability detection techniques and tools and their relationship to agile methods and software quality and service models","display_name":"Vulnerability detection techniques and tools and their relationship to agile methods and software quality and service models","publication_year":2019,"publication_date":"2019-05-20","ids":{"openalex":"https://openalex.org/W2967621780","doi":"https://doi.org/10.1145/3330204.3330257","mag":"2967621780"},"language":"en","primary_location":{"id":"doi:10.1145/3330204.3330257","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3330204.3330257","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the XV Brazilian Symposium on Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026537728","display_name":"L\u00edgia C\u00e1ssia M. C. Santos","orcid":null},"institutions":[{"id":"https://openalex.org/I17974374","display_name":"Universidade de S\u00e3o Paulo","ror":"https://ror.org/036rp1748","country_code":"BR","type":"education","lineage":["https://openalex.org/I17974374"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"L\u00edgia C\u00e1ssia M. C. Santos","raw_affiliation_strings":["Universidade de S\u00e3o Paulo, Rua Arlindo Bettio, S\u00e3o Paulo, SP"],"affiliations":[{"raw_affiliation_string":"Universidade de S\u00e3o Paulo, Rua Arlindo Bettio, S\u00e3o Paulo, SP","institution_ids":["https://openalex.org/I17974374"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053158942","display_name":"Edmir Parada Vasques Prado","orcid":"https://orcid.org/0000-0002-3505-6122"},"institutions":[{"id":"https://openalex.org/I17974374","display_name":"Universidade de S\u00e3o Paulo","ror":"https://ror.org/036rp1748","country_code":"BR","type":"education","lineage":["https://openalex.org/I17974374"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Edmir Parada V. Prado","raw_affiliation_strings":["Universidade de S\u00e3o Paulo, Rua Arlindo Bettio, S\u00e3o Paulo, SP"],"affiliations":[{"raw_affiliation_string":"Universidade de S\u00e3o Paulo, Rua Arlindo Bettio, S\u00e3o Paulo, SP","institution_ids":["https://openalex.org/I17974374"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020521912","display_name":"Marcos Lordello Chaim","orcid":"https://orcid.org/0000-0001-7157-5141"},"institutions":[{"id":"https://openalex.org/I17974374","display_name":"Universidade de S\u00e3o Paulo","ror":"https://ror.org/036rp1748","country_code":"BR","type":"education","lineage":["https://openalex.org/I17974374"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Marcos Lordello Chaim","raw_affiliation_strings":["Universidade de S\u00e3o Paulo, Rua Arlindo Bettio, S\u00e3o Paulo, SP"],"affiliations":[{"raw_affiliation_string":"Universidade de S\u00e3o Paulo, Rua Arlindo Bettio, S\u00e3o Paulo, SP","institution_ids":["https://openalex.org/I17974374"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026537728"],"corresponding_institution_ids":["https://openalex.org/I17974374"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.12436618,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/agile-software-development","display_name":"Agile software development","score":0.813878059387207},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6553934812545776},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5440167784690857},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.5305607318878174},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.47980669140815735},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.46833017468452454},{"id":"https://openalex.org/keywords/software-development-process","display_name":"Software development process","score":0.44960951805114746},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4393799304962158},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.4101768136024475},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3376937210559845},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2114538848400116},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18628624081611633}],"concepts":[{"id":"https://openalex.org/C14185376","wikidata":"https://www.wikidata.org/wiki/Q30232","display_name":"Agile software development","level":2,"score":0.813878059387207},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6553934812545776},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5440167784690857},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.5305607318878174},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.47980669140815735},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.46833017468452454},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.44960951805114746},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4393799304962158},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.4101768136024475},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3376937210559845},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2114538848400116},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18628624081611633},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3330204.3330257","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3330204.3330257","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the XV Brazilian Symposium on Information Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1559155956","https://openalex.org/W1601126803","https://openalex.org/W1947959002","https://openalex.org/W2015004885","https://openalex.org/W2096947085","https://openalex.org/W2098353690","https://openalex.org/W2104682122","https://openalex.org/W2124477160","https://openalex.org/W2157820602","https://openalex.org/W2165848285","https://openalex.org/W2220172508","https://openalex.org/W2289390325","https://openalex.org/W2321127073","https://openalex.org/W2417374371","https://openalex.org/W2443190109","https://openalex.org/W2563098966","https://openalex.org/W2606791856","https://openalex.org/W2795767164","https://openalex.org/W2891759093","https://openalex.org/W4229960817","https://openalex.org/W4231588088","https://openalex.org/W4388295091","https://openalex.org/W6635021154","https://openalex.org/W6654219798","https://openalex.org/W6718470012"],"related_works":["https://openalex.org/W2017062194","https://openalex.org/W3105511281","https://openalex.org/W983931886","https://openalex.org/W2472680075","https://openalex.org/W2088382486","https://openalex.org/W4292756589","https://openalex.org/W2566085182","https://openalex.org/W2212955619","https://openalex.org/W2886008366","https://openalex.org/W2778196409"],"abstract_inverted_index":{"Information":[0],"systems":[1],"need":[2],"to":[3,6,15,26,43,81,102,152],"be":[4],"safe":[5],"achieve":[7],"their":[8],"goals.":[9],"Thus,":[10],"during":[11],"development":[12,87,126],"one":[13],"needs":[14],"detect":[16],"possible":[17],"vulnerabilities":[18],"present":[19],"in":[20,37,49,94,109,124],"the":[21,28,95,110,113,120,131,140,156],"software.":[22],"This":[23],"paper":[24],"aims":[25],"describe":[27,119],"use":[29,52,121,141],"of":[30,73,84,97,122,133,142],"vulnerability":[31,104],"detection":[32,105],"techniques":[33,65,106],"and":[34,40,46,66,107,128,136,139,154],"tools":[35,67,108],"(VDTT)":[36],"complex":[38,125],"environments":[39,127],"its":[41],"relationship":[42],"software":[44,75,86,134],"quality":[45,135],"service":[47,137],"models":[48,138],"teams":[50,88],"that":[51,68],"agile":[53,85],"methods.":[54],"To":[55],"do":[56],"so,":[57],"a":[58],"survey":[59,78],"was":[60,79,150],"carried":[61],"out":[62],"listing":[63],"18":[64],"used":[69,151],"three":[70],"well-known":[71],"processes":[72],"secure":[74],"development.":[76],"The":[77],"applied":[80],"76":[82],"members":[83],"who":[89],"have":[90],"already":[91],"deployed,":[92],"are":[93,100],"process":[96],"deploying,":[98],"or":[99],"going":[101],"deploy":[103],"projects.":[111],"From":[112],"data":[114],"collected,":[115],"we":[116],"were":[117],"able":[118],"VDTT":[123],"associations":[129,157],"between":[130],"adoption":[132],"VDTTs.":[143],"For":[144],"this":[145],"purpose,":[146],"Fischer's":[147],"exact":[148],"test":[149],"analyze":[153],"interpret":[155],"found.":[158]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
