{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:23:14Z","timestamp":1771957394276,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"N\/A"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04382-7","type":"journal-article","created":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T08:58:49Z","timestamp":1758790729000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["AI-Powered Static &amp; Dynamic Analysis for Continuous Security in DevSecOps"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4029-0639","authenticated-orcid":false,"given":"Praveen Chaitanya","family":"Jakku","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"key":"4382_CR1","doi-asserted-by":"publisher","DOI":"10.1145\/3712190","author":"M Fu","year":"2024","unstructured":"Fu M, Pasuksmit J, Tantithamthavorn C. AI for devsecops: a landscape and future opportunities. ACM Trans Softw Eng Methodol. 2024. https:\/\/doi.org\/10.1145\/3712190.","journal-title":"ACM Trans Softw Eng Methodol."},{"key":"4382_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00909-w","author":"M Bedoya","year":"2024","unstructured":"Bedoya M, Palacios S, D\u00edaz-L\u00f3pez D, Laverde E, Nespoli P. Enhancing devsecops practice with large language models and security chaos engineering. Int J Inf Secur. 2024a. https:\/\/doi.org\/10.1007\/s10207-024-00909-w.","journal-title":"Int J Inf Secur"},{"key":"4382_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00909-w","author":"M Bedoya","year":"2024","unstructured":"Bedoya M, Palacios S, D\u00edaz-L\u00f3pez D, Laverde E, Nespoli P. Enhancing devsecops practice with large language models and security chaos engineering. Int J Inf Secur. 2024b. https:\/\/doi.org\/10.1007\/s10207-024-00909-w.","journal-title":"Int J Inf Secur"},{"key":"4382_CR4","doi-asserted-by":"publisher","unstructured":"Chen Y, Ding Z, Alowain L, Chen X, Wagner D. 2023. DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID \u201823). Association for Computing Machinery, New York, NY, USA, 654\u2013668. https:\/\/doi.org\/10.1145\/3607199.3607242","DOI":"10.1145\/3607199.3607242"},{"key":"4382_CR5","doi-asserted-by":"publisher","unstructured":"Lipp S, Banescu S, Pretschner A. 2022. An empirical study on the effectiveness of static C code analyzers for vulnerability detection. In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2022). Association for Computing Machinery, New York, NY, USA, 544\u2013555. https:\/\/doi.org\/10.1145\/3533767.3534380","DOI":"10.1145\/3533767.3534380"},{"key":"4382_CR6","doi-asserted-by":"publisher","unstructured":"Asare O, Nagappan M, Asokan N. (2024). A user-centered security evaluation of Copilot. Proceedings of the 46th International Conference on Software Engineering (ICSE), 158:1\u2013158:11. https:\/\/doi.org\/10.1145\/3597503.3639154","DOI":"10.1145\/3597503.3639154"},{"issue":"3","key":"4382_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14445\/22312803\/IJCTT-V72I3P101","volume":"72","author":"S Kumarasamy","year":"2024","unstructured":"Kumarasamy S, Varadarajan MN, Koppada LR. Comparative analysis of veracode and blackduck for enhancing application security in cloud environments. Int J Comput Trends Technol. 2024;72(3):1\u20136. https:\/\/doi.org\/10.14445\/22312803\/IJCTT-V72I3P101.","journal-title":"Int J Comput Trends Technol"},{"issue":"1","key":"4382_CR8","first-page":"1","volume":"14","author":"VU Ugwueze","year":"2024","unstructured":"Ugwueze VU, Chukwunweike JN. Continuous integration and deployment strategies for streamlined devops in software engineering and application delivery. Int J Comput Appl Technol Res. 2024;14(1):1\u201324. https:\/\/www.researchgate.net\/profile\/Joseph-Chukwunweike\/publication\/387601097_Continuous_Integration_and_Deployment_Strategies_for_Streamlined_DevOps_in_Software_Engineering_and_Application_Delivery\/links\/67752a7fc1b013546506a3c5\/Continuous-Integration-and-Deployment-Strategies-for-Streamlined-DevOps-in-Software-Engineering-and-Application-Delivery.pdf.","journal-title":"Int J Comput Appl Technol Res"},{"key":"4382_CR9","unstructured":"Chellappan RB. The Future of DevOps: Intelligent, Secure and Scalable Software Delivery. https:\/\/www.researchgate.net\/profile\/Ramesh-Babu-Chellappan\/publication\/387127506_The_Future_of_DevOps_Intelligent_Secure_and_Scalable_Software_Delivery_I_Dr_Ramesh_Babu_Chellappan\/links\/67615e7e996d2552c3f3033a\/The-Future-of-DevOps-Intelligent-Secure-and-Scalable-Software-Delivery-I-Dr-Ramesh-Babu-Chellappan.pdf"},{"key":"4382_CR10","unstructured":"Oberkrome F. (2023). AI for Continuous Compliance and Policy Enforcement in DevOps Security Frameworks. https:\/\/www.researchgate.net\/profile\/Elijah-William\/publication\/388633184_AI_for_Continuous_Compliance_and_Policy_Enforcement_in_DevOps_Security_Frameworks\/links\/67a01f4a96e7fb48b9afcbfe\/AI-for-Continuous-Compliance-and-Policy-Enforcement-in-DevOps-Security-Frameworks.pdf"},{"key":"4382_CR11","unstructured":"Bishop S. (2024). AI for Continuous Compliance and Policy Enforcement in DevOps Security Frameworks. https:\/\/www.researchgate.net\/profile\/Temitope-Adewale-2\/publication\/388638315_AI_for_Continuous_Compliance_and_Policy_Enforcement_in_DevOps_Security_Frameworks\/links\/67a05fcc96e7fb48b9afd20a\/AI-for-Continuous-Compliance-and-Policy-Enforcement-in-DevOps-Security-Frameworks.pdf"},{"key":"4382_CR12","doi-asserted-by":"publisher","DOI":"10.47363\/JAICC\/2022","author":"KC Panda","year":"2022","unstructured":"Panda KC, Agrawal S. Application of AI and ML in the field of devsecops. J Artif Intell Cloud Comput. 2022. https:\/\/doi.org\/10.47363\/JAICC\/2022.","journal-title":"J Artif Intell Cloud Comput."},{"key":"4382_CR13","unstructured":"Redding P. Securing DevOps Pipelines with AI-Powered Threat Detection and Mitigation. https:\/\/www.researchgate.net\/profile\/Saheed-Martin\/publication\/388639873_Securing_DevOps_Pipelines_with_AI-Powered_Threat_Detection_and_Mitigation\/links\/67a0615c207c0c20fa72f40f\/Securing-DevOps-Pipelines-with-AI-Powered-Threat-Detection-and-Mitigation.pdf"},{"issue":"5","key":"4382_CR14","first-page":"335","volume":"18","author":"A Joseph","year":"2024","unstructured":"Joseph A, Paulose J. Harnessing the power of AI: transforming devsecops for enhanced cloud security. Int J Comput Inform Eng. 2024;18(5):335\u201341.","journal-title":"Int J Comput Inform Eng"},{"key":"4382_CR15","unstructured":"Kyler T. (2024). AI-Driven DevSecOps: Integrating Security into Continuous Integration and Deployment Pipelines. https:\/\/www.researchgate.net\/profile\/Mengkorn-Pum-2\/publication\/388634768_Real-Time_Load_Forecasting_Using_GRU-LGBM_in_Smart_Grids\/links\/67a042c996e7fb48b9afcfa2\/Real-Time-Load-Forecasting-Using-GRU-LGBM-in-Smart-Grids.pdf"},{"issue":"1","key":"4382_CR16","doi-asserted-by":"publisher","first-page":"211","DOI":"10.3390\/s25010211","volume":"25","author":"AC Moreno","year":"2025","unstructured":"Moreno AC, Hernandez-Suarez A, Sanchez-Perez G, Toscano-Medina LK, Perez-Meana H, Portillo-Portillo J, Olivares-Mercado J, Garc\u00eda-Villalba LJ. Anal Auton Penetration Test Through Reinforcement Learn Recommender Systems Sensors. 2025;25(1):211. https:\/\/doi.org\/10.3390\/s25010211.","journal-title":"Sensors"},{"key":"4382_CR17","unstructured":"Luz H, Peace P, Luz A, Joseph S. (2024). Impact of Emerging AI Techniques on CI\/CD Deployment Pipelines. https:\/\/www.researchgate.net\/profile\/Hivez-Luz\/publication\/387556393_Impact_of_Emerging_AI_Techniques_on_CICD_Deployment_Pipelines\/links\/6773c770fb9aff6eaafb63dd\/Impact-of-Emerging-AI-Techniques-on-CI-CD-Deployment-Pipelines.pdf"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04382-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04382-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04382-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T08:58:51Z","timestamp":1758790731000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04382-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,25]]},"references-count":17,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["4382"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04382-7","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,25]]},"assertion":[{"value":"16 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and\/or Animals"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"852"}}