The Journal of Defense Software Engineering

Visit desktop site
Sep/Oct 2014 — Acquisition of Software-Reliant Capabilities
Visit desktop site
From the Publisher - Sep/Oct 2014
Using Concept Maps to Introduce Software Security Assurance Cases
Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals
Evaluating Security Risks Using Mission Threads
The Necessity of Intended Use Specification for Successful Modeling and Simulation of a System-of-Systems
Software Assurance, Trustworthiness, and Rigor
N-Version Architectural Framework for Application Security Automation (NVASA)
Acquisition Anonymous
Forecasting from Defect Signals
Agile Surveillance Points: An Alternative to Milestone Reviews
BackTalk - Unfit for Use (Unless You Perform a Lot of Maintenance!)