{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:17:22Z","timestamp":1772641042377,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3727967.3756840","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T11:53:17Z","timestamp":1766490797000},"page":"136-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The Role of Generative AI in Strengthening Secure Software Coding Practices: A Systematic Perspective"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8262-8154","authenticated-orcid":false,"given":"Hathal Salamah","family":"Alwageed","sequence":"first","affiliation":[{"name":"College of Computer and Information Sciences, Jouf University, Sakaka, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4321-5557","authenticated-orcid":false,"given":"Rafiq Ahmad","family":"Khan","sequence":"additional","affiliation":[{"name":"Software Engineering Research Group, Department of Computer Science and IT, University of Malakand, Malakand, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2025,12,23]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.07.077"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104208"},{"key":"e_1_3_3_1_3_2","first-page":"108109","article-title":"Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach","author":"Alzahrani A.","year":"2023","unstructured":"A. Alzahrani and R. A. Khan, \"Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach,\" Computers in Human Behavior, p. 108109, 2023\/12\/26\/ 2023.","journal-title":"Computers in Human Behavior"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/app12083953"},{"key":"e_1_3_3_1_5_2","first-page":"1","article-title":"Generative Artificial Intelligence for Software Security Analysis: Fundamentals, Applications, and Challenges","author":"Ding A.","year":"2024","unstructured":"A. Ding, G. Li, X. Yi, X. Lin, J. Li, and C. Zhang, \"Generative Artificial Intelligence for Software Security Analysis: Fundamentals, Applications, and Challenges,\" IEEE Software, pp. 1-8, 2024.","journal-title":"IEEE Software"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.3850\/978-981-18-8071-1_P413-cd"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.106894"},{"key":"e_1_3_3_1_8_2","volume-title":"Salerno","author":"Akbar M. A.","year":"2024","unstructured":"M. A. Akbar, S. Rafi, S. Hyrynsalmi, and A. A. Khan, \"Towards People Maturity for Secure Development and Operations: A vision,\" presented at the Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, Salerno, Italy, 2024."},{"key":"e_1_3_3_1_9_2","volume-title":"Transforming Software Development with Generative AI: Empirical Insights on Collaboration and Workflow","author":"Ulfsnes R.","year":"2024","unstructured":"R. Ulfsnes, N. Moe, V. Stray, and M. Skarpen, Transforming Software Development with Generative AI: Empirical Insights on Collaboration and Workflow, 2024."},{"key":"e_1_3_3_1_10_2","volume-title":"Method Definition Document,\" HANDBOOK CMU\/SEI-2011-HB-001March","author":"Team S. U.","year":"2011","unstructured":"S. U. Team, \"Standard CMMI Appraisal Method for Process Improvement (SCAMPI) A, Version 1.3: Method Definition Document,\" HANDBOOK CMU\/SEI-2011-HB-001March 2011."},{"key":"e_1_3_3_1_11_2","first-page":"1617","volume-title":"Chapter 101 - Use of Artificial Intelligence (AI) in Cybersecurity,\" in Computer and Information Security Handbook","author":"Gurtu A.","year":"2025","unstructured":"A. Gurtu and D. Lim, \"Chapter 101 - Use of Artificial Intelligence (AI) in Cybersecurity,\" in Computer and Information Security Handbook (Fourth Edition), J. R. Vacca, Ed., ed: Morgan Kaufmann, 2025, pp. 1617-1624."},{"key":"e_1_3_3_1_12_2","first-page":"1","article-title":"Optimizing Secure AI Lifecycle Model Management with Innovative Generative AI Strategies","author":"Almagrabi A. O.","year":"2024","unstructured":"A. O. Almagrabi and R. A. Khan, \"Optimizing Secure AI Lifecycle Model Management with Innovative Generative AI Strategies,\" IEEE Access, pp. 1-1, 2024.","journal-title":"IEEE Access"},{"key":"e_1_3_3_1_13_2","volume-title":"Artificial Intelligence in Software Testing: A Systematic Review","author":"Islam M.","year":"2023","unstructured":"M. Islam, F. Khan, S. Alam, and M. Hasan, Artificial Intelligence in Software Testing: A Systematic Review, 2023."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dim.2023.100063"},{"key":"e_1_3_3_1_15_2","article-title":"Software integration model: An assessment tool for global software development vendors","volume":"2540","author":"Ilyas M.","year":"2023","unstructured":"M. Ilyas, S. U. Khan, H. U. Khan, and N. Rashid, \"Software integration model: An assessment tool for global software development vendors,\" Journal of Software: Evolution and Process, vol. n\/a, p. e2540, 2023.","journal-title":"Journal of Software: Evolution and Process"},{"key":"e_1_3_3_1_16_2","unstructured":"M. Quarterly \"Implementing generative AI with speed and safety \" https:\/\/www.mckinsey.com\/capabilities\/risk-and-resilience\/our-insights\/implementing-generative-ai-with-speed-and-safety pp. 1-10 2024."},{"key":"e_1_3_3_1_17_2","unstructured":"B. Kitchenham and S. Charters \"Guidelines for Performing Systematic Literature Reviews in Software Engineering \" Keele University and Durham University2007."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3140181"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3178301"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.007"},{"key":"e_1_3_3_1_22_2","first-page":"68","article-title":"Systematic mapping studies in software engineering","author":"Petersen K.","year":"2008","unstructured":"K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson, \"Systematic mapping studies in software engineering,\" Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering, pp. 68\u201377, 2008.","journal-title":"Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering"},{"key":"e_1_3_3_1_23_2","first-page":"367","volume-title":"Asia Int. Multidisciplinary Conf.(AIMC)","author":"Khan R. A.","year":"2019","unstructured":"R. A. Khan, S. A. Ullah, and I. Yazid, \"Systematic mapping study protocol for secure software engineering,\" in Proc. Asia Int. Multidisciplinary Conf.(AIMC), 2019, pp. 367-374."},{"key":"e_1_3_3_1_24_2","volume-title":"Exploring Security Procedures in Secure Software Engineering: A Systematic Mapping Study","author":"Khan A. R.","year":"2022","unstructured":"A. R. Khan, S. Khan, and M. Ilyas, Exploring Security Procedures in Secure Software Engineering: A Systematic Mapping Study, 2022."},{"key":"e_1_3_3_1_25_2","first-page":"1","article-title":"Security risks of global software development life cycle: Industry practitioner's perspective","volume":"36","author":"Khan R. A.","year":"2023","unstructured":"R. A. Khan, S. U. Khan, M. A. Akbar, and M. Alzahrani, \"Security risks of global software development life cycle: Industry practitioner's perspective,\" Journal of Software: Evolution and Process, vol. 36, pp. 1-34, 2023.","journal-title":"Journal of Software: Evolution and Process"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3491373"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2023.12.003"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2023.54628"},{"key":"e_1_3_3_1_29_2","first-page":"132","article-title":"Generative Adversarial Networks: A Survey Toward Private and Secure Applications","volume":"54","author":"Cai Z.","year":"2021","unstructured":"Z. Cai, Z. Xiong, H. Xu, P. Wang, W. Li, and Y. Pan, \"Generative Adversarial Networks: A Survey Toward Private and Secure Applications,\" ACM Comput. Surv., vol. 54, p. Article 132, 2021.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijme.2023.100822"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2023.3265877"},{"key":"e_1_3_3_1_32_2","volume-title":"Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities","author":"Ferrag M. A.","year":"2024","unstructured":"M. A. Ferrag, F. Alwahedi, A. A. Battah, B. Cherif, A. Mechri, N. Tihanyi, et al., \"Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities,\" 2024."},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2024.103997"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2023.105898"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103424"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.3390\/computers14020055"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2024.106066"},{"key":"e_1_3_3_1_38_2","first-page":"01","article-title":"Generative AI for Cyber Security: Analyzing the Potential of ChatGPT, DALL-E and Other Models for Enhancing the Security Space","volume":"1","author":"Sai S.","year":"2024","unstructured":"S. Sai, U. Yashvardhan, V. Chamola, and B. Sikdar, \"Generative AI for Cyber Security: Analyzing the Potential of ChatGPT, DALL-E and Other Models for Enhancing the Security Space,\" IEEE Access, vol. PP, pp. 1-1, 01\/01 2024.","journal-title":"IEEE Access"}],"event":{"name":"EASE Companion '25: Evaluation and Assessment in Software Engineering","location":"Istanbul Turkiye","acronym":"EASE Companion '25"},"container-title":["Proceedings of the 2025 29th International Conference on Evaluation and Assessment in Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727967.3756840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:07:51Z","timestamp":1766491671000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727967.3756840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":38,"alternative-id":["10.1145\/3727967.3756840","10.1145\/3727967"],"URL":"https:\/\/doi.org\/10.1145\/3727967.3756840","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}