{"id":"https://openalex.org/W4379932658","doi":"https://doi.org/10.1145/3590837.3590860","title":"Benchmark for Investigating the Security in Software Development Phases","display_name":"Benchmark for Investigating the Security in Software Development Phases","publication_year":2022,"publication_date":"2022-12-23","ids":{"openalex":"https://openalex.org/W4379932658","doi":"https://doi.org/10.1145/3590837.3590860"},"language":"en","primary_location":{"id":"doi:10.1145/3590837.3590860","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590837.3590860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081330199","display_name":"Jameel Ahmad Qurashi","orcid":"https://orcid.org/0000-0003-0763-595X"},"institutions":[{"id":"https://openalex.org/I101407740","display_name":"Chandigarh University","ror":"https://ror.org/05t4pvx35","country_code":"IN","type":"education","lineage":["https://openalex.org/I101407740"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Jameel A. Qurashi","raw_affiliation_strings":["University Institute of Computing, Chandigarh University, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University Institute of Computing, Chandigarh University, India","institution_ids":["https://openalex.org/I101407740"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101906930","display_name":"Sandeep Singh Sandhu","orcid":"https://orcid.org/0000-0002-6865-7493"},"institutions":[{"id":"https://openalex.org/I101407740","display_name":"Chandigarh University","ror":"https://ror.org/05t4pvx35","country_code":"IN","type":"education","lineage":["https://openalex.org/I101407740"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sapandeep Singh Sandhu","raw_affiliation_strings":["CSE, University Institute of Computing Chandigarh University, India"],"raw_orcid":"https://orcid.org/0000-0002-6865-7493","affiliations":[{"raw_affiliation_string":"CSE, University Institute of Computing Chandigarh University, India","institution_ids":["https://openalex.org/I101407740"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087143345","display_name":"Purushottam Lal Bhari","orcid":"https://orcid.org/0000-0001-5417-4004"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Purushottam Lal Bhari","raw_affiliation_strings":["CSE, PIET, India"],"raw_orcid":"https://orcid.org/0000-0001-5417-4004","affiliations":[{"raw_affiliation_string":"CSE, PIET, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081330199"],"corresponding_institution_ids":["https://openalex.org/I101407740"],"apc_list":null,"apc_paid":null,"fwci":0.319,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.69246295,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.7832648754119873},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6484700441360474},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.627518892288208},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.6188665628433228},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.5464181303977966},{"id":"https://openalex.org/keywords/backporting","display_name":"Backporting","score":0.5244603157043457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.515526294708252},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.5138178467750549},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.5126451849937439},{"id":"https://openalex.org/keywords/component-based-software-engineering","display_name":"Component-based software engineering","score":0.44808781147003174},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4375728368759155},{"id":"https://openalex.org/keywords/package-development-process","display_name":"Package development process","score":0.43328046798706055},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4315285086631775},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4292118549346924},{"id":"https://openalex.org/keywords/software-development-process","display_name":"Software development process","score":0.4125719964504242},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3270968794822693},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.22343316674232483},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.2160007357597351},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15387743711471558},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.0688599944114685}],"concepts":[{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.7832648754119873},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6484700441360474},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.627518892288208},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.6188665628433228},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.5464181303977966},{"id":"https://openalex.org/C21491501","wikidata":"https://www.wikidata.org/wiki/Q430253","display_name":"Backporting","level":5,"score":0.5244603157043457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.515526294708252},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.5138178467750549},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.5126451849937439},{"id":"https://openalex.org/C174683762","wikidata":"https://www.wikidata.org/wiki/Q609588","display_name":"Component-based software engineering","level":4,"score":0.44808781147003174},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4375728368759155},{"id":"https://openalex.org/C123551368","wikidata":"https://www.wikidata.org/wiki/Q7122888","display_name":"Package development process","level":5,"score":0.43328046798706055},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4315285086631775},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4292118549346924},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.4125719964504242},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3270968794822693},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.22343316674232483},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2160007357597351},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15387743711471558},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0688599944114685}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3590837.3590860","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590837.3590860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1486178352","https://openalex.org/W2015328639","https://openalex.org/W2045974024","https://openalex.org/W2101855829","https://openalex.org/W2119789510","https://openalex.org/W2126513753","https://openalex.org/W2183445937","https://openalex.org/W2403970759","https://openalex.org/W3161918289","https://openalex.org/W4235041424","https://openalex.org/W6600254076","https://openalex.org/W6628879857","https://openalex.org/W6629015823","https://openalex.org/W6633017693","https://openalex.org/W6661558821","https://openalex.org/W6671096144","https://openalex.org/W6671103823","https://openalex.org/W6674330518","https://openalex.org/W6678038605","https://openalex.org/W6682069979","https://openalex.org/W6682385452","https://openalex.org/W6684492503"],"related_works":["https://openalex.org/W60029630","https://openalex.org/W2165353488","https://openalex.org/W2662284196","https://openalex.org/W3115342344","https://openalex.org/W1582981252","https://openalex.org/W2748680318","https://openalex.org/W2167539342","https://openalex.org/W2085025225","https://openalex.org/W2031438860","https://openalex.org/W2185558977"],"abstract_inverted_index":{"People,":[0],"hardware,":[1],"software,":[2],"data,":[3],"and":[4,27,52,63,80],"networks":[5],"are":[6,31],"all":[7,44],"components":[8,37],"of":[9,33,38,87,94],"an":[10],"information":[11,22,39],"system.":[12],"Each":[13],"component":[14],"must":[15],"be":[16],"strong":[17],"enough":[18],"to":[19,24,43,68],"allow":[20],"the":[21,34,69,101],"system":[23],"operate":[25],"quickly":[26],"reliably.":[28],"Software":[29],"systems":[30,40,53],"one":[32],"most":[35],"important":[36],"in":[41,96],"comparison":[42],"other":[45],"components.":[46],"Integrating":[47],"security":[48,89,99,109],"into":[49],"software":[50,59,65,73,88,108],"products":[51],"is":[54,91],"a":[55,92,113],"huge":[56],"issue":[57],"for":[58],"engineers.":[60],"Including":[61],"sophisticated":[62],"secure":[64],"management.":[66],"According":[67],"current":[70],"networked":[71],"environment,":[72],"has":[74,110],"grown":[75],"defenseless":[76],"against":[77],"both":[78],"purposeful":[79],"unintentional":[81],"malicious":[82],"intent.":[83],"The":[84],"main":[85],"disadvantage":[86],"flaws":[90],"lack":[93],"vigilance":[95],"addressing":[97],"objectified":[98],"during":[100],"Programme":[102],"development":[103],"process.":[104],"Without":[105],"much":[106],"care,":[107],"long":[111],"been":[112],"secondary":[114],"issue.":[115]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-01-08T20:05:33.558190","created_date":"2025-10-10T00:00:00"}
