References
[1]. Abrahamson, P., Salo, O., Ronkainen, J., & Warsta, J. (2002). Agile Software Development Methods: Review and Analysis. Finland: VTT Publications.
[2]. Al-Janabi, S. T. F. (2011, April). Nahrainfish: A green cryptographic block cipher. In 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC) (pp. 1-5). IEEE. https://doi.org/10.1109/SIECPC. 2011.5876890
[3]. Al-Janabi, S., & Hussein, W. A. (2016). Architectural design of general cryptanalysis platform for pedagogical purposes. i-manager's Journal on Software Engineering, 11(1), 1-12. https://doi.org/10.26634/jse.11.1.8189
[4]. Al-Janabi, S., Al-Khateeb, B., & Abd, A. J. (2017). Intelligent techniques in cryptanalysis: Review and Future Directions. UHD Journal of Science and Technology, University of Human Development (UHD), Sulaimaniya, KRG-Iraq, 1(1), 1-9.
[5]. Clark, A. (1994, December). Modern optimisation algorithms for cryptanalysis. In Proceedings of ANZIIS'94- Australian New Zealnd Intelligent Information Systems Conference (pp. 258-262). IEEE. https://doi.org/10.1109/ ANZIIS.1994.396969
[6]. Dimovski, A., & Gligoroski, D. (2003). Attacks on the transposition ciphers using optimization heuristics. In Proceedings International Scientific Conference on Information, Communication, & Energy Systems & Technologies (ICEST), (pp. 1-4).
[7]. DSDM Consortium (2008). DSDM Public Version 4.2 Manual. USA: DSDM Consortium.
[8]. Misra, S. C., Kumar, V., & Kumar, U. (2006). Success factors of agile software development. Software Engineering Research and Practice, 1, 233-239.
[9]. Peleg, S., & Rosenfeld, A. (1979). Breaking substitution ciphers using a relaxation algorithm. Communications of the ACM, 22(11), 598-605. https://doi.org/10.1145/ 359168.359174
[10]. Russo, B., Scotto, M., Sillitti, A., & Succi, G. (2010). Agile Technologies in Open Source Development. USA: Hershey- Information Science Reference. https://doi.org/10.4018/ 978-1-59904-681-5.ch002
[11]. Sani, A., Firdaus, A., Jeong, S. R., & Ghani, I. (2013). A review on software development security engineering using dynamic system method (DSDM). International Journal of Computer Applications, 69(25), 87-94.
[12]. Spillman, R., Janssen, M., Nelson, B., & Kepner, M. (1993). Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers. Cryptologia, 17(1), 31-44. https://doi.org/10.1080/0161-119391867746
[13]. Stapleton, J. (1997). DSDM Dynamic Systems Development Method: The Method in Practice. UK: Cambridge University Press.
[14]. Uddin, M. F., & Youssef, A. M. (2006, July). Cryptanalysis of simple substitution ciphers using particle swarm optimization. In 2006 IEEE International Conference on Evolutionary Computation (pp. 677-680). IEEE. https://doi.org/10.1109/CEC.2006.1688376
[15]. Verma, A. K., Dave, M., & Joshi, R. C. (2007). Genetic algorithm and tabu search attack on the mono-alphabetic substitution cipher i adhoc networks. Journal of Computer Science, 3(3), 134-137. https://doi.org/ 10.1.1.122.6400
[16]. Weerd, I. & Brinkkemper, S. (2008). Meta-modelling for situational analysis and design methods. In M.R. Syed Ed. Handbook of research on modern systems analysis and design technologies and applications (pp. 38-58), IGI Global,
[17]. Wenbo, M. (2004). Modern Cryptography: Theory and Practice. USA: Prentice Hall PTR - Hewlett Packard.