Author:
Khan Rafiq Ahmad,Habibullah Safa,Alzahrani Abdulrahman,Akbar Muhammad Azeem,Alwageed Hathal Salamah,Alzahrani Musaad
Reference76 articles.
1. Trustworthiness models to categorize and prioritize code for security improvement;N Medeiros;Journal of Systems and Software,2023
2. Evaluation of requirement engineering best practices for secure software development in GSD: An ISM analysis;R A Khan;Journal of Software: Evolution and Process
3. Cross-domain vulnerability detection using graph embedding and domain adaptation;X Li;Computers & Security
4. Systematic Mapping Study on Security Approaches in Secure Software Engineering;R A Khan;IEEE Access,2021
5. Secure software development: a prescriptive framework;R Khan;Computer Fraud & Security,2011