Improved extreme programming methodology with inbuilt security
Security in e-commerce is becoming an important issue to deal with as several cases of attacks to users' data are increasing exponentially. Therefore, there is absolute need for proper checks and balances to mitigate the lapses using the appropriate development framework. This paper provides as...
| Main Authors: | Shuaibu, Bala Musa, Md. Norwawi, Norita, Selamat, Mohd Hasan, Sharif, Khaironi Yatim |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/56514/ http://psasir.upm.edu.my/id/eprint/56514/1/Improved%20extreme%20programming%20methodology%20with%20inbuilt%20security.pdf |
Similar Items
Secure e-commerce web development framework
by: Shuaibu, Bala Musa, et al.
Published: (2011)
by: Shuaibu, Bala Musa, et al.
Published: (2011)
Improving cross-project software defect prediction method through transformation and feature selection approach
by: Bala, Yahaya Zakariyau, et al.
Published: (2023)
by: Bala, Yahaya Zakariyau, et al.
Published: (2023)
Evolution of information security awareness towards maturity: a systematic review
by: Ahmad, Mohd Ridzam, et al.
Published: (2024)
by: Ahmad, Mohd Ridzam, et al.
Published: (2024)
Wi-Fi received signal strength-based hyperbolic location estimation for indoor positioning systems
by: Narzullaev, Anvar, et al.
Published: (2019)
by: Narzullaev, Anvar, et al.
Published: (2019)
Detecting Fraud Patterns in Telecommunications Using Case Based Reasoning
by: Shuaibu, Bala Musa
Published: (2008)
by: Shuaibu, Bala Musa
Published: (2008)
Computational Recognition-Primed Decision Model Based on Temporal Data Mining Approach in a Multiagent Environment for Reservoir Flood Control Decision
by: Norita, Md Norwawi
Published: (2004)
by: Norita, Md Norwawi
Published: (2004)
Wi-fi fingerprint database construction using Chebyshev wavelet functions
by: Narzullaev, Anvar, et al.
Published: (2015)
by: Narzullaev, Anvar, et al.
Published: (2015)
Extremism: causes and remedies of extremism
by: Ali, Md Yousuf
Published: (2017)
by: Ali, Md Yousuf
Published: (2017)
The influence of machine learning on the predictive performance of cross-project defect prediction: empirical analysis
by: Bala, Yahaya Zakariyau, et al.
Published: (2024)
by: Bala, Yahaya Zakariyau, et al.
Published: (2024)
Cross-project software defect prediction through multiple
learning
by: Zakariyau Bala, Yahaya, et al.
Published: (2024)
by: Zakariyau Bala, Yahaya, et al.
Published: (2024)
Cross-project software defect prediction
by: Bala, Yahaya Zakariyau, et al.
Published: (2022)
by: Bala, Yahaya Zakariyau, et al.
Published: (2022)
New improvement in digital forensic Standard Operating Procedure (SOP)
by: Perumal, Sundresan, et al.
Published: (2011)
by: Perumal, Sundresan, et al.
Published: (2011)
Political extremism, conflict identities and the search for ontological security in contemporary established democracies
by: Rich, Ben
Published: (2021)
by: Rich, Ben
Published: (2021)
Stable vibration-based communication scheme using multi-step ASK and PPM techniques
by: Usa, Keishi, et al.
Published: (2018)
by: Usa, Keishi, et al.
Published: (2018)
Evaluation of software quality attributes for vessel tracking management system (VTMS)
by: Zulzalil, Hazura, et al.
Published: (2015)
by: Zulzalil, Hazura, et al.
Published: (2015)
Evaluation of software quality attributes for Vessel Tracking Management System (VTMS)
by: Zulzalil, Hazura, et al.
Published: (2015)
by: Zulzalil, Hazura, et al.
Published: (2015)
Hybrid genetic algorithm for improving fault localization
by: Mahamad Zakaria, Muhammad Luqman, et al.
Published: (2018)
by: Mahamad Zakaria, Muhammad Luqman, et al.
Published: (2018)
Open source programmers' information seeking during software maintenance
by: Sharif, Khaironi Yatim, et al.
Published: (2011)
by: Sharif, Khaironi Yatim, et al.
Published: (2011)
pSPADE: Mining sequential pattern using personalized support threshold value
by: Alias, Suraya, et al.
Published: (2008)
by: Alias, Suraya, et al.
Published: (2008)
Shariah screening methodology of Securities Commission Malaysia: an analytical fiqh study
by: Mohd Nor, Ahmad Mawardi, et al.
Published: (2017)
by: Mohd Nor, Ahmad Mawardi, et al.
Published: (2017)
Basic qualitative research methodology workshop
by: Mokhtar, Nor Zainiyah Norita
Published: (2019)
by: Mokhtar, Nor Zainiyah Norita
Published: (2019)
A decision cloud ranking approach based on privacy and security in blockchain E-Health Industry 4.0 systems
by: Qahtan, Sarah, et al.
Published: (2023)
by: Qahtan, Sarah, et al.
Published: (2023)
S-Scrum: a secure methodology for agile development of web services
by: Mougouei, Davoud, et al.
Published: (2013)
by: Mougouei, Davoud, et al.
Published: (2013)
Analysing extreme temperature scenarios in peninsular Malaysia using Generalized Extreme Value (GEV) / Nur Hanim Mohd Salleh
by: Mohd Salleh, Nur Hanim, et al.
Published: (2017)
by: Mohd Salleh, Nur Hanim, et al.
Published: (2017)
Computer programming ability assessment with data mining
by: Md Norwawi, Norita, et al.
Published: (2006)
by: Md Norwawi, Norita, et al.
Published: (2006)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
Integrated model for organizational transformation in business process reengineering
by: Osman, Jami'ah, et al.
Published: (2007)
by: Osman, Jami'ah, et al.
Published: (2007)
On extreme Gibbs measures of the Vannimenus model
by: Ganikhodjaev, Nasir, et al.
Published: (2011)
by: Ganikhodjaev, Nasir, et al.
Published: (2011)
Extremism and militancy
by: Akhmetova, Elmira
Published: (2015)
by: Akhmetova, Elmira
Published: (2015)
Challenges in online secure authentication and authorization methodology: a review
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
A simple way to improve the security of Bluetooth devices
by: Dell, Peter, et al.
Published: (2008)
by: Dell, Peter, et al.
Published: (2008)
Source code analysis extractive approach to generate textual summary
by: Dawood, Kareem Abbas, et al.
Published: (2017)
by: Dawood, Kareem Abbas, et al.
Published: (2017)
Machine learning: tasks, modern day applications and challenges
by: Aljuaid, Lamyaa Zaed, et al.
Published: (2019)
by: Aljuaid, Lamyaa Zaed, et al.
Published: (2019)
N/A and signature analysis for malwares detection and removal
by: Jawad, Ahmad Ridha, et al.
Published: (2019)
by: Jawad, Ahmad Ridha, et al.
Published: (2019)
Status quo effect and preferences uncertainty: a heteroscedastic extreme value
(HEV) model
by: Bakti Hasan-Basri,, et al.
Published: (2013)
by: Bakti Hasan-Basri,, et al.
Published: (2013)
Advance qualitative research methodology workshop for centre of teaching and learning
by: Mokhtar, Nor Zainiyah Norita
Published: (2019)
by: Mokhtar, Nor Zainiyah Norita
Published: (2019)
Be prepared for extreme weather
by: Kamarudin, Kurniawati, et al.
Published: (2021)
by: Kamarudin, Kurniawati, et al.
Published: (2021)
Secret to Success: Securing Petronas Vendor Development Program (VDP)
by: M. S. M., Sani, et al.
Published: (2016)
by: M. S. M., Sani, et al.
Published: (2016)
CPT113 – Programming Methodology & Data Structure Methodologi Pengaturcaraan & Struktur Data
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Identification of risk factors of volent extremism among Malaysian violent extremism detainees
by: Mohd Rashid, Nurul Miza, et al.
Published: (2018)
by: Mohd Rashid, Nurul Miza, et al.
Published: (2018)
Similar Items
-
Secure e-commerce web development framework
by: Shuaibu, Bala Musa, et al.
Published: (2011) -
Improving cross-project software defect prediction method through transformation and feature selection approach
by: Bala, Yahaya Zakariyau, et al.
Published: (2023) -
Evolution of information security awareness towards maturity: a systematic review
by: Ahmad, Mohd Ridzam, et al.
Published: (2024) -
Wi-Fi received signal strength-based hyperbolic location estimation for indoor positioning systems
by: Narzullaev, Anvar, et al.
Published: (2019) -
Detecting Fraud Patterns in Telecommunications Using Case Based Reasoning
by: Shuaibu, Bala Musa
Published: (2008)