[1]
O. M.Surakhi, A. Hudaib, M. AlShraideh, and M. Khanafseh, “A Survey on Design Methods for Secure Software Development”, IJCT, vol. 16, no. 7, pp. 7047–7064, Dec. 2017.