H. Abelson, R. Anderson, S. M. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau, P. G. Neumann, R. L. Rivest, J. I. Schiller, B. Schneier, M. Specter, and D. J. Weitzner, “Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”, Jul. 2015.http://dspace.mit.edu/handle/1721.1/97690
Basili, V., “Software Development: A Paradigm for the Future,” Proceedings of COMPSAC '89, pp. 471-485, September 1989.
Basili, V. and A. Turner, “Iterative Enhancement: A Practical Technique for Software Development,” IEEE Transactions on Software Engineering, vol. 1(4), December 1975 (update appears as Portfolio 14-01-05, Auerbach Information Management Series, 1978).
Basili, V. R., R. W. Selby, and D. H. Hutchens, “Experimentation in software engineering”, IEEE Transactions on Software Engineering, Vol. SE-12, no. 7, pp. 733-743, 1986.
Boehm, B.W. A Spiral Model of Software Development and Enhancement. IEEE Computer, 21(5):61-72, May 1988.
B. Boehm, B. Clark, et al. Cost models for future software life cycle processes: COCOMO 2.0. Annals of Software Engineering, 1: 57-94, 1995.
Antonia Bertolino, Software Testing Research: Achievements, Challenges, Dreams, May 2007, IEEE Future of Software Engineering, 2007.
Bennett, K. H., & Rajlich, V. T. (2000, May). Software maintenance and evolution: a roadmap. In Proceedings of the Conference on the Future of Software Engineering (pp. 73-87). ACM.
Booch, G., “Object-oriented development”, IEEE Transactions on Software Engineering, vol. SE-12, no. 2, pp. 211-221, 1986.
Brooks, F. P., “No silver bullet: Essence and accidents of software engineering?” Computer, vol. 20, no. 4, pp. 10-19, 1987.
M. Jackson, “The World and the Machine”, in Proceedings of the 17th International Conference on Software Engineering, ser. ICSE ’95, New York, NY, USA: ACM, 1995, pp. 283–292, ISBN: 978-0-89791-708-7. DOI: 10.1145/225014.225041.
Raymond, E. S. The cathedral and the bazaar. First Monday, 3(3), 1998.
Gregg Rothermel, Roland H. Untch, Chengyun Chu, Mary Jean Harrold, Prioritizing Test Cases for Regression Testing, IEEE Transactions on Software Engineering, V. 27, no. 10, October, 2001, pages 929-948
Barbara A. Kitchenham, Hiyam Al-Kilidar, Muhammad Ali Babar, Mike Berry, Karl Cox, Jacky Keung, Felicia Kurniawati, Mark Staples, He Zhang,Liming Zhu: Evaluating guidelines for reporting empirical software engineering studies. Empirical Software Engineering 13(1): 97-121 (2008)
Kitchenham, B., 2007. Guidelines for performing systematic literature reviews in SE, s.l.: EBSE technical report: Software Engineering Group, Keele University and Department of Computer Science, University of Durham.
Kitchenham, B., Pfleeger, S. L., Jan. 1996. Software quality: The elusive target. IEEE Software 13 (1), 12-21.
Philippe Kruchten, Robert L. Nord, Ipek Ozkaya: Technical Debt: From Metaphor to Theory and Practice. IEEE Software 29(6): 18-21 (2012)
Menzies, T., Butcher, A., Cok, D., Marcus, A., Layman, L., Shull, F., Turhan, B., Zimmermann, T., Local vs. Global Lessons for Defect Prediction and Effort Estimation, IEEE Transactions on Software Engineering, 2013.
B. Nuseibeh and S. Easterbrook, “Requirements Engineering: A Roadmap”, in Proceedings of the International Conference on Software Engineering (ICSE ’00), New York, NY, USA: ACM, 2000, pp. 35– 46, ISBN: 978-1-58113-253-3. DOI: 10.1145/336512.336523.
Osterweil, Leon J. Software Processes Are Software Too. In Proceedings of the 9th International Conference on Software Engineering, pp. 2-13, Monterey, CA, March 1987.
P. N. Otto and A. I. Antón, “Addressing Legal Requirements in Requirements Engineering”, in 15th IEEE International Requirements Engineering Conference (RE 2007), Oct. 2007, pp. 5–14. DOI: 10.1109/ RE.2007.65.
Parnas, D. L., “On the criteria to be used in decomposing systems into modules”, Communications of ACM, vol. 15, no. 12, pp. 1053-1058, 1972.
Poshyvanyk, D., Guéhéneuc, Y. G., Marcus, A., Antoniol, G., & Rajlich, V. (2007). Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. Software Engineering, IEEE Transactions on, 33(6), 420-432
E. H. Spafford and A. I. Antón, “The Balance of Security and Privacy”, in Controversies in Science and Technology, vol. 2, Also published as CERIAS Technical Report TR 2006-36, New York, NY, USA: Mary Ann Liebert, Inc, 2008. https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2006-36.pdf