{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T23:53:57Z","timestamp":1776297237707,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032168078","type":"print"},{"value":"9783032168085","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16808-5_34","type":"book-chapter","created":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T23:14:16Z","timestamp":1776294856000},"page":"415-427","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Static Code Analysis with AI-Assisted Detection of Security Vulnerabilities and Code Quality Issues"],"prefix":"10.1007","author":[{"given":"Augustinas","family":"Labutis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9206-8361","authenticated-orcid":false,"given":"Jonas","family":"\u010ceponis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9268-9244","authenticated-orcid":false,"given":"\u0160ar\u016bnas","family":"Grigali\u016bnas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0816-8700","authenticated-orcid":false,"given":"Rasa","family":"Br\u016bzgien\u0117","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"34_CR1","volume-title":"Software, Attacker and Asset-centric Approach for Improving Security in System Development Process","author":"AH bin Abdul Rahman","year":"2020","unstructured":"bin Abdul Rahman, A.H., Nazir, A., Hyun, K.T., Yarng, T.H., tuz Zahra, F.: Software, Attacker and Asset-centric Approach for Improving Security in System Development Process (2020), https:\/\/arxiv.org\/abs\/2012.10881"},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"215758","DOI":"10.1109\/ACCESS.2020.3040220","volume":"8","author":"H Al-Matouq","year":"2020","unstructured":"Al-Matouq, H., Mahmood, S., Alshayeb, M., Niazi, M.: A maturity model for secure software design: a multivocal study. IEEE Access. 8, 215758\u2013215776 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3040220","journal-title":"IEEE Access"},{"issue":"3","key":"34_CR3","first-page":"7048","volume":"8","author":"M Alenezi","year":"2019","unstructured":"Alenezi, M., Almuairfi, S.: Security risks in the software development lifecycle. Int. J. Recent Technol. Eng. 8(3), 7048\u20137055 (2019)","journal-title":"Int. J. Recent Technol. Eng."},{"issue":"2","key":"34_CR4","first-page":"1","volume":"11","author":"M Alenezi","year":"2020","unstructured":"Alenezi, M., Almuairfi, S.: Essential activities for secure software development. Int. J. Softw. Eng. Appl. 11(2), 1\u201314 (2020)","journal-title":"Int. J. Softw. Eng. Appl"},{"key":"34_CR5","first-page":"281","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)","author":"H Assal","year":"2018","unstructured":"Assal, H., Chiasson, S.: Security in the software development lifecycle. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 281\u2013296 (2018)"},{"key":"34_CR6","unstructured":"AugustasRun.: AugustasRun\/ICIST2025 (May 2025), https:\/\/github.com\/AugustasRun\/ICIST2025"},{"issue":"66","key":"34_CR7","first-page":"32037","volume":"12","author":"PC Behera","year":"2021","unstructured":"Behera, P.C., Dash, C., Yadav, S.K.: An approach for secure software development life cycle in small software firms. Indian J. Nat. Sci. 12(66), 32037\u201332041 (2021)","journal-title":"Indian J. Nat. Sci."},{"key":"34_CR8","volume-title":"Integration of Security Modules in Software Development Lifecycle Phases","author":"IC Eian","year":"2020","unstructured":"Eian, I.C., Yong, L.K., Li, M.Y.X., Hasmaddi, N.A.B.N., tuz Zahra, F.: Integration of Security Modules in Software Development Lifecycle Phases (2020),. https:\/\/arxiv.org\/abs\/2012.05540"},{"key":"34_CR9","doi-asserted-by":"publisher","unstructured":"Fauzi, M.F., Mohan, V.R., Qi, Y., Chandrasegar, C., Muzafar, S.: Secure software development: best practices. Int. J. Emer. Multidisciplinaries Comput. Sci. Artif. Intell. 2(1) (2023). https:\/\/doi.org\/10.54938\/ijemdcsai.2023.02.1.256","DOI":"10.54938\/ijemdcsai.2023.02.1.256"},{"issue":"2","key":"34_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.36676\/sjmbt.v2.i2.40","volume":"2","author":"B Gajbhiye","year":"2024","unstructured":"Gajbhiye, B., Jain, S., Chhapola, A.: Secure sdlc: incorporating blockchain for enhanced security. Sci. J. Metaverse Blockchain Technol. 2(2), 1\u201310 (2024). https:\/\/doi.org\/10.36676\/sjmbt.v2.i2.40. https:\/\/sjmbt.com\/index.php\/j\/article\/view\/40","journal-title":"Sci. J. Metaverse Blockchain Technol."},{"key":"34_CR11","first-page":"137","volume-title":"21st International Workshop on Computer Science and Information Technologies (CSIT 2019)","author":"L Gonchar","year":"2019","unstructured":"Gonchar, L.: Implementation of secure software development lifecycle in a large software development organization. In: 21st International Workshop on Computer Science and Information Technologies (CSIT 2019), pp. 137\u2013139. Atlantis Press (2019)"},{"key":"34_CR12","volume-title":"Importance of Secure Software Development for the Software Development at Different SDLC Phases","author":"FMA Hassan","year":"2024","unstructured":"Hassan, F.M.A., Das, S.R., Hussain, M.: Importance of Secure Software Development for the Software Development at Different SDLC Phases. Authorea Preprints (2024)"},{"issue":"1","key":"34_CR13","doi-asserted-by":"publisher","DOI":"10.1155\/2024\/9962691","volume":"2024","author":"S Hussain","year":"2024","unstructured":"Hussain, S., et al: Mitigating software vulnerabilities through secure software development with a policy-driven waterfall model. J. Eng. 2024(1), 9962691 (2024)","journal-title":"J. Eng."},{"issue":"1","key":"34_CR14","doi-asserted-by":"publisher","first-page":"406","DOI":"10.35940\/ijrte.F8125.059120","volume":"9","author":"S Jeyapriya","year":"2020","unstructured":"Jeyapriya, S., Rekha, C.: SDLC security framework for software startup. Int. J. Recent Technol. Eng (IJRTE). 9(1), 406\u2013409 (2020). https:\/\/doi.org\/10.35940\/ijrte.F8125.059120. https:\/\/www.ijrte.org\/portfolio-item\/F8125038620\/","journal-title":"Int. J. Recent Technol. Eng (IJRTE)"},{"key":"34_CR15","volume-title":"Risk Assessment, Threat Modeling and Security Testing in SDLC","author":"AHA Kamal","year":"2020","unstructured":"Kamal, A.H.A., Yen, C.C.Y., Hui, G.J., Ling, P.S., tuz Zahra, F.: Risk Assessment, Threat Modeling and Security Testing in SDLC (2020),. https:\/\/arxiv.org\/abs\/2012.07226"},{"issue":"18","key":"34_CR16","doi-asserted-by":"publisher","first-page":"5333","DOI":"10.1002\/sec.1700","volume":"9","author":"NSA Karim","year":"2016","unstructured":"Karim, N.S.A., Albuolayan, A., Saba, T., Rehman, A.: The practice of secure software development in SDLC: an investigation through existing model and a case study. Secur. Commun. Netw. 9(18), 5333\u20135345 (2016). https:\/\/doi.org\/10.1002\/sec.1700. https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1700","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"34_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2521","volume":"36","author":"RA Khan","year":"2024","unstructured":"Khan, R.A., Khan, S.U., Akbar, M.A., Alzahrani, M.: Security risks of global software development life cycle: industry practitioner\u2019s perspective. J. Softw. Evol. Process. 36(3), e2521 (2024)","journal-title":"J. Softw. Evol. Process"},{"key":"34_CR18","doi-asserted-by":"publisher","first-page":"19139","DOI":"10.1109\/ACCESS.2021.3052311","volume":"9","author":"RA Khan","year":"2021","unstructured":"Khan, R.A., Khan, S.U., Khan, H.U., Ilyas, M.: Systematic mapping study on security approaches in secure software engineering. IEEE Access. 9, 19139\u201319160 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3052311","journal-title":"IEEE Access"},{"key":"34_CR19","doi-asserted-by":"publisher","first-page":"5456","DOI":"10.1109\/ACCESS.2022.3140181","volume":"10","author":"RA Khan","year":"2022","unstructured":"Khan, R.A., Khan, S.U., Khan, H.U., Ilyas, M.: Systematic literature review on security risks and its practices in secure software development. IEEE Access. 10, 5456\u20135481 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3140181","journal-title":"IEEE Access"},{"key":"34_CR20","unstructured":"Kim, S.Y., Fan, Z., Noller, Y., Roychoudhury, A.: Codexity: secure ai-assisted code generation. arXiv preprint arXiv, 2405.03927 (2024)"},{"key":"34_CR21","volume-title":"Secure Software Development Methodologies: A Multivocal Literature Review","author":"A Kudriavtseva","year":"2023","unstructured":"Kudriavtseva, A., Gadyatskaya, O.: Secure Software Development Methodologies: A Multivocal Literature Review (2023),. https:\/\/arxiv.org\/abs\/2211.16987"},{"issue":"2","key":"34_CR22","first-page":"218","volume":"15","author":"MH Kurdi","year":"2024","unstructured":"Kurdi, M.H., Denden, M., Paul, D.: A study on the challenges of human-centric cyber-security and the guarantee of information quality. J. Inf. Secur. 15(2), 218\u2013231 (2024)","journal-title":"J. Inf. Secur."},{"key":"34_CR23","unstructured":"Li, Z., Dutta, S., Naik, M.: Llm-assisted static analysis for detecting security vulnerabilities. arXiv preprint arXiv, 2405.17238 (2024)"},{"key":"34_CR24","first-page":"110","volume-title":"Proceedings of the 5th ACM IEEE International Conference on Automation of Software Test","author":"A Marchetto","year":"2024","unstructured":"Marchetto, A.: Can explainability and deep-learning be used for localizing vulnerabilities in source code? In: Proceedings of the 5th ACM IEEE International Conference on Automation of Software Test, pp. 110\u2013119 (2024)"},{"key":"34_CR25","first-page":"012009","volume-title":"IOP Conference Series: Materials Science and Engineering","author":"YM Mohialden","year":"2020","unstructured":"Mohialden, Y.M., Alazawi, S.A., Elewe, A.M., et al.: An improved life cycle for building secure software. In: IOP Publishing (ed.) IOP Conference Series: Materials Science and Engineering, vol. 871, p. 012009 (2020)"},{"key":"34_CR26","doi-asserted-by":"publisher","first-page":"77653","DOI":"10.1109\/ACCESS.2020.2989113","volume":"8","author":"JCS N\u00fa\u00f1ez","year":"2020","unstructured":"N\u00fa\u00f1ez, J.C.S., Lindo, A.C., Rodr\u00edguez, P.G.: A preventive secure software development model for a software factory: a case study. IEEE Access. 8, 77653\u201377665 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2989113","journal-title":"IEEE Access"},{"key":"34_CR27","first-page":"13","volume-title":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","author":"OS Ozturk","year":"2023","unstructured":"Ozturk, O.S., Ekmekcioglu, E., Cetin, O., Arief, B., Hernandez-Castro, J.: New tricks to old codes: can ai chatbots replace static code analysis tools? In: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, pp. 13\u201318 (2023)"},{"key":"34_CR28","volume-title":"Models of Secure Software Enforcement and Development","author":"HM Palombo","year":"2020","unstructured":"Palombo, H.M.: Models of Secure Software Enforcement and Development. Ph.D. thesis,. University of South Florida (2020)"},{"issue":"8","key":"34_CR29","doi-asserted-by":"publisher","first-page":"536","DOI":"10.29322\/IJSRP.13.08.2023.p14015","volume":"13","author":"S Pargaonkar","year":"2023","unstructured":"Pargaonkar, S.: A comprehensive research analysis of software development life cycle (SDLC) agile & waterfall model advantages, disadvantages, and application suitability in software quality engineering. Int. J. Sci. Res. Publ. 13(8), 536\u2013540 (2023). https:\/\/doi.org\/10.29322\/IJSRP.13.08.2023.p14015. https:\/\/www.ijsrp.org\/research-paper-0823.php?rp=P14012999","journal-title":"Int. J. Sci. Res. Publ."},{"key":"34_CR30","volume-title":"Secure Software Development: Issues and Challenges","author":"SW Ping","year":"2023","unstructured":"Ping, S.W., Wah, J.C.J., Jie, L.W., Han, J.B.Y., Muzafar, S.: Secure Software Development: Issues and Challenges (2023),. https:\/\/arxiv.org\/abs\/2311.11021"},{"key":"34_CR31","unstructured":"Roshaidie, M.D., Liang, W.P.H., Jun, C.G.K., Yew, K.H., et al.: Importance of secure software development processes and tools for developers. arXiv preprint arXiv, 2012.15153 (2020)"},{"issue":"3","key":"34_CR32","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1002\/sec.1700","volume":"8","author":"F Sabbah","year":"2015","unstructured":"Sabbah, F., Makadmeh, K.A.: The practice of secure software development in SDLC: an investigation through existing model and a case study. Secur. Priv. 8(3), 180\u2013191 (2015). https:\/\/doi.org\/10.1002\/sec.1700. https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1700","journal-title":"Secur. Priv."},{"key":"34_CR33","doi-asserted-by":"publisher","unstructured":"NIST T.: Secure Software Development Framework (Ssdf) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities. Tech. Rep. NIST SP 800\u2013218, National Institute of Standards and Technology. doi:https:\/\/doi.org\/10.6028\/NIST.SP.800-218. https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800\u2013218.pdf. (2021)","DOI":"10.6028\/NIST.SP.800-218"},{"issue":"1","key":"34_CR34","doi-asserted-by":"publisher","first-page":"012020","DOI":"10.1088\/1742-6596\/1566\/1\/012020","volume":"1566","author":"B Sugiantoro","year":"2020","unstructured":"Sugiantoro, B., Anshari, M., Sudrajat, D.: Developing framework for web based e-commerce: secure-sdlc. J. Phys. Conf. Ser. 1566(1), 012020 (2020). https:\/\/doi.org\/10.1088\/1742-6596\/1566\/1\/012020. https:\/\/iopscience.iop.org\/article\/10.1088\/1742-6596\/1566\/1\/012020","journal-title":"J. Phys. Conf. Ser."},{"key":"34_CR35","doi-asserted-by":"crossref","unstructured":"Umeugo, W.: Secure software development lifecycle: a case for adoption in software Smes. Int. J. Adv. Res. Comput. Sci. 14(1) (2023)","DOI":"10.26483\/ijarcs.v14i1.6949"},{"issue":"7","key":"34_CR36","doi-asserted-by":"publisher","first-page":"4578","DOI":"10.3390\/app13074578","volume":"13","author":"Y Vald\u00e9s-Rodr\u00edguez","year":"2023","unstructured":"Vald\u00e9s-Rodr\u00edguez, Y., Hochstetter-Diez, J., D\u00edaz-Arancibia, J., Cadena-Mart\u00ednez, R.: Towards the integration of security practices in agile software development: a systematic mapping review. Appl. Sci. 13(7), 4578 (2023)","journal-title":"Appl. Sci."},{"issue":"11","key":"34_CR37","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.3390\/electronics8111218","volume":"8","author":"J de Vicente Mohino","year":"2019","unstructured":"de Vicente Mohino, J., Bermejo Higuera, J., Bermejo Higuera, J.R., Sicilia Montalvo, J.A.: The application of a new secure software development life cycle (s-sdlc) with agile methodologies. Electronics. 8(11), 1218 (2019)","journal-title":"Electronics"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16808-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T23:14:19Z","timestamp":1776294859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16808-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032168078","9783032168085"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16808-5_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaunas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icist2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icist.ktu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}