{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:31:47Z","timestamp":1772519507116,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,2,1]]},"DOI":"10.23919\/date51398.2021.9474185","type":"proceedings-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T22:11:46Z","timestamp":1629843106000},"page":"1330-1333","source":"Crossref","is-referenced-by-count":15,"title":["VeriDevOps: Automated Protection and Prevention to Meet Security Requirements in DevOps"],"prefix":"10.23919","author":[{"given":"Andrey","family":"Sadovykh","sequence":"first","affiliation":[]},{"given":"Gunnar","family":"Widforss","sequence":"additional","affiliation":[]},{"given":"Dragos","family":"Truscan","sequence":"additional","affiliation":[]},{"given":"Eduard Paul","family":"Enoiu","sequence":"additional","affiliation":[]},{"given":"Wissam","family":"Mallouli","sequence":"additional","affiliation":[]},{"given":"Rosa","family":"Iglesias","sequence":"additional","affiliation":[]},{"given":"Alessandra","family":"Bagnto","sequence":"additional","affiliation":[]},{"given":"Olga","family":"Hendel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232966"},{"key":"ref3","article-title":"2018 VULNERABILITY STATISTICS REPORT","year":"0","journal-title":"edgescan"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.20"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.41"},{"key":"ref11","author":"sadovykh","year":"2019","journal-title":"On the use of hackathons to enhance collaboration in large collaborative projects - a preliminary case study of the MegaM Rt2 EU project"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.56"},{"key":"ref8","author":"humble","year":"2010","journal-title":"Continuous Delivery Reliable Software Releases through Build Test and Deployment Automation (Adobe Reader)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.08.046"},{"key":"ref2","article-title":"2020 Cyber Threatscape Report","year":"0","journal-title":"Accenture"},{"key":"ref9","author":"bass","year":"2015","journal-title":"DevOps A Software Architect's Perspective"},{"key":"ref1","article-title":"Is software more vulnerable today?","year":"0","journal-title":"Proc Eur Union Agency Cybersecurity (ENISA)"}],"event":{"name":"2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)","location":"Grenoble, France","start":{"date-parts":[[2021,2,1]]},"end":{"date-parts":[[2021,2,5]]}},"container-title":["2021 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9473901\/9473226\/09474185.pdf?arnumber=9474185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T21:38:37Z","timestamp":1643319517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9474185\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,1]]},"references-count":11,"URL":"https:\/\/doi.org\/10.23919\/date51398.2021.9474185","relation":{},"subject":[],"published":{"date-parts":[[2021,2,1]]}}}