REFERENCES
Assal, H. and Chiasson, S. (2018). Security in the soft-
ware development lifecycle. In Fourteenth Symposium
on Usable Privacy and Security (SOUPS 2018), pages
281–296, Baltimore, MD. USENIX Association.
Balaji, S. and Murugaiyan, M. S. (2012). Waterfall vs.
V-Model vs. Agile: A comparative study on SDLC.
International Journal of Information Technology and
Business Management, 2(1):26–30.
Bennetts, S. (2013). Owasp zed attack proxy. AppSec USA.
Chen, L. (2015). Continuous delivery: Huge benefits, but
challenges too. IEEE Software, 32.
Chung, A. (2018). How DevOps can use quality gates for
security checks.
Ebert, C., Gallardo, G., Hernantes, J., and Serrano, N.
(2016). DevOps. IEEE Softw., 33(3):94–100.
Github (2021). Events that trigger workflows.
Goteti, H. (2015). API Driven development , bridging the
gap between providers and consumers.
Hegde, V. and Singh, A. (2020). Team collaboration in De-
vOps: Accenture.
Howard, M. and Lipner, S. (2006). The Security Develop-
ment Lifecycle. Microsoft Press.
Huang, C.-C. and Kusiak, A. (1996). Overview of Kan-
ban systems. International Journal of Computer Inte-
grated Manufacturing, 9(3):169–189.
Jaatun, M. G., Cruzes, D. S., and Luna, J. (2017). Devops
for better software security in the cloud. In Proceed-
ings of the 12th International Conference on Avail-
ability, Reliability and Security, ARES ’17, pages
69:1–69:6, New York, NY, USA. ACM.
Jabbari, R., bin Ali, N., Petersen, K., and Tanveer, B.
(2016). What is DevOps? a systematic mapping study
on definitions and practices. In Proceedings of the Sci-
entific Workshop Proceedings of XP2016, pages 1–11.
Kaur, A. and Nayyar, R. (2020). A comparative study of
static code analysis tools for vulnerability detection in
C/C++ and JAVA source code. Procedia Computer
Science, 171:2023–2029. Third International Con-
ference on Computing and Network Communications
(CoCoNet’19).
Kronjee, J., Hommersom, A., and Vranken, H. (2018).
Discovering software vulnerabilities using data-flow
analysis and machine learning. In Proceedings of the
13th International Conference on Availability, Relia-
bility and Security, ARES 2018, New York, NY, USA.
Association for Computing Machinery.
Kumar, R. and Goyal, R. (2020). Modeling continuous se-
curity: A conceptual model for automated DevSecOps
using open-source software over cloud (adoc). Com-
puters & Security, 97:101967.
Kurniawan, A., Abbas, B. S., Trisetyarso, A., and Isa,
S. M. (2018). Static taint analysis traversal with ob-
ject oriented component for web file injection vulner-
ability pattern detection. Procedia Computer Science,
135:596–605.
Leite, L., Rocha, C., Kon, F., Milojicic, D., and Meirelles, P.
(2019). A survey of DevOps concepts and challenges.
ACM Computing Surveys, 52(6).
Mantere, M., Uusitalo, I., and Roning, J. (2009). Com-
parison of Static Code Analysis tools. In 2009 Third
International Conference on Emerging Security Infor-
mation, Systems and Technologies, pages 15–22.
Mao, R., Zhang, H., Dai, Q., Huang, H., Rong, G., Shen,
H., Chen, L., and Lu, K. (2020). Preliminary findings
about DevSecOps from Grey Literature. In 2020 IEEE
20th International Conference on Software Quality,
Reliability and Security (QRS), pages 450–457.
McGraw, G. (2006). Software Security: Building Security
In. Addison-Wesley.
Myrbakken, H. and Colomo-Palacios, R. (2017). DevSec-
Ops: a multivocal literature review. In International
Conference on Software Process Improvement and
Capability Determination, pages 17–29. Springer.
Oyetoyan, T. D., Jaatun, M. G., and Cruzes, D. S. (2017). A
lightweight measurement of software security skills,
usage and training needs in agile teams. International
Journal of Secure Software Engineering, 8(1):1–27.
Rajapakse, R., Zahedi, M., Ali Babar, M., and Shen, H.
(2021). Challenges and solutions when adopting De-
vSecOps: A systematic review. Information and Soft-
ware Technology.
Rao, K. N., Naidu, G. K., and Chakka, P. (2011). A study of
the Agile software development methods, applicabil-
ity and implications in industry. International Journal
of Software Engineering and its applications, 5(2):35–
45.
Rehkopf, M. (2001). Manifesto for agile software develop-
ment.
Rehkopf, M. (2020). Kanban vs. Scrum: which Agile are
you?
Savor, T., Douglas, M., Gentili, M., Williams, L., Beck,
K., and Stumm, M. (2016). Continuous deploy-
ment at Facebook and OANDA. In 2016 IEEE/ACM
38th International Conference on Software Engineer-
ing Companion (ICSE-C), pages 21–30.
Schlossnagle, T. (2018). Monitoring in a DevOps world.
Commun. ACM, 61(3):58–61.
Shahin, M., Ali Babar, M., and Zhu, L. (2017). Continu-
ous integration, delivery and deployment: A system-
atic review on approaches, tools, challenges and prac-
tices. IEEE Access, 5:3909–3943.
S
¨
onmez, F. O. and Kilic¸, B. G. (2021). Holistic web ap-
plication security visualization for multi-project and
multi-phase dynamic application security test results.
IEEE Access, 9:25858–25884.
Talukder, A., Maurya, V., Santhosh, B., Jangam, E., Muni,
S., Kp, J., Samanta, S., and Pais, A. (2009). Security-
aware software development life cycle (SaSDLC) -
processes and tools. In 2009 IFIP International Con-
ference on Wireless and Optical Communications Net-
works, pages 1 – 5.
Virmani, M. (2015). Understanding DevOps & bridging the
gap from continuous integration to continuous deliv-
ery. In Fifth International Conference on the Inno-
vative Computing Technology (INTECH 2015), pages
78–82, Piscataway, NJ. IEEE.
Williams, L., McGraw, G., and Migues, S. (2018). En-
gineering security vulnerability prevention, detection,
and response. IEEE Software, 35(5):76–80.
IoTBDS 2022 - 7th International Conference on Internet of Things, Big Data and Security
238