Academic Editor
Contributions by role
Editor 2
Summair Raza
University of Sargodha, Pakistan
Summary
Edited Journals
ICCK Contributions

Open Access | Review Article | 18 August 2025
Requirements Elicitation in Transition: A Review of Conventional and Contemporary Approaches
ICCK Journal of Software Engineering | Volume 1, Issue 1: 32-45, 2025 | DOI: 10.62762/JSE.2025.862549
Abstract
Requirements elicitation is one of the most important steps in the software development process. It involves understanding what users and stakeholders need from a system before it is built. Traditionally, this has been done using methods like interviews, questionnaires, document reviews, and direct observation. These approaches work well in structured environments but often fall short when dealing with large, fast-changing, or agile projects. In recent years, software development has shifted toward more flexible and fast-paced practices. This change has also affected how requirements are gathered. New techniques now include collaborative tools, user feedback from online platforms, and the us... More >

Graphical Abstract
Requirements Elicitation in Transition: A Review of Conventional and Contemporary Approaches

Open Access | Review Article | 17 August 2025
Secure Software Engineering for Industrial IoT: A Comprehensive Review of Threat Modeling and Defense Mechanisms
ICCK Journal of Software Engineering | Volume 1, Issue 1: 17-31, 2025 | DOI: 10.62762/JSE.2025.834259
Abstract
The Industrial Internet of Things (IIoT) is a foundational pillar of Industry 4.0, enabling real-time data exchange and automation through the integration of smart sensors, actuators, and networked machinery. While this interconnectivity enhances operational efficiency and decision-making on the industrial floor, it also introduces complex cybersecurity challenges. This work reviews literature related to the IIoT with a focus on threat modeling techniques, including mitigation strategies. It comprises the theoretical frameworks and the implemented solutions within the domains of critical infrastructure and manufacturing. The coexistence of legacy control software systems, stringent real-time... More >

Graphical Abstract
Secure Software Engineering for Industrial IoT: A Comprehensive Review of Threat Modeling and Defense Mechanisms