1. A. Apvrille and Makan Pourzandi . 2005. Secure Software Development by Example. Security & Privacy , IEEE 3 (08 2005 ), 10 – 17. https://doi.org/10.1109/MSP.2005.103 10.1109/MSP.2005.103 A. Apvrille and Makan Pourzandi. 2005. Secure Software Development by Example. Security & Privacy, IEEE 3 (08 2005), 10 – 17. https://doi.org/10.1109/MSP.2005.103
2. A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
3. A Cloud SecDevOps Methodology: From Design to Testing
4. Juan D. V. M., Javier B. H., Juan Ramón B. H., and Juan Antonio S. M.2019. The Application of a New Secure Software Development Life Cycle (S-SDLC) with Agile Methodologies. Electronics 8, 11 ( 2019 ). https://doi.org/10.3390/electronics8111218 10.3390/electronics8111218 Juan D. V. M., Javier B. H., Juan Ramón B. H., and Juan Antonio S. M.2019. The Application of a New Secure Software Development Life Cycle (S-SDLC) with Agile Methodologies. Electronics 8, 11 (2019). https://doi.org/10.3390/electronics8111218
5. Malik Imran Daud . 2010. Secure Software Development Model: A Guide for Secure Software Life Cycle. LNCS 2180 (07 2010 ). Malik Imran Daud. 2010. Secure Software Development Model: A Guide for Secure Software Life Cycle. LNCS 2180 (07 2010).