Author:
Arega Kedir Lemma,Beyene Asrat Mulatu,Yitagesu Sofonias
Publisher
Springer Nature Switzerland
Reference27 articles.
1. Al-Matouq, H., Mahmood, S., Alshayeb, M., Niazi, M.: A maturity model for secure software design: a multivocal study. IEEE Access 8, 1–19 (2020)
2. Mnkandla, S., Moyo, E.: A novel lightweight solo software development methodology with optimum security practices. IEEE Access 8, 1–13 (2020)
3. Khan, R.A., Khan, S.U., Khan, H.U., Ilyas, M.: Systematic mapping study on security approaches in secure software engineering. IEEE Access 9, 19139–19160 (2021)
4. Al-Zahrani, F.A.: Evaluating the usable-security of healthcare software through unified technique of fuzzy logic ANP and TOPSIS. IEEE Access 8, 1–12 (2020)
5. Yi, C.-G., Kim, Y.-G.: Security testing for naval ship combat system software. IEEE Access 9, 1–13 (2021)