Now showing items 1-3 of 3
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...
COSMIC Base Functional Components in Functional Size Based Effort Estimation Models
Software effort estimation models has been an area of considerable research for many years and it is still a challenge for software engineering. Although Functional Size Measurement (FSM) methods have become widely used, ...
Function Point Structure and Applicability: A Replicated Study
The complexity of providing accurate functional software size and effort prediction models is well known in the software industry. Function point analysis (FPA) is currently one of the most accepted software functional ...