1. Churi, J.R., Sudhish, T., Ajay, S., Yewale, S.: Evolution of networks (2G–5G). In: International Conference on Advances in Communication and Computing Technologies (ICACACT), (2012)
2. Verizon Data Breach Investigations Report. [Online]. Available: https://www.fsecure.com/en/consulting/our-thinking/inside-the-2017-verizon-dbir. Accessed 29 March 2022
3. Rastogi, V.: Software development life cycle models-comparison, consequences. Int. J. Comput. Sci. Inf. Technol. 6(1) (2015)
4. Hackedu.: [Online]. Available: https://www.hackedu.com/blog/what-is-a-securesoftware-development-lifecycle-and-how-do-you-build-an-application-securityprogram. Accessed 1 April 2022
5. Schmidt, H.: Threat- and risk-analysis during early security requirements engineering. In: International Conference on Availability, Reliability and Security, Krakow, Poland, (2010)