共 50 条
- [21] Security on software life cycle using intrusion detection system [J]. APSITT 2005: 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, Proceedings, 2005, : 360 - 363
- [22] Software development life cycle model to ensure software quality [J]. PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT (PSAM 4), VOLS 1-4, 1998, : 1104 - 1110
- [23] Survey: Security in the system development life cycle [J]. PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 310 - 316
- [24] An Information Security Policy Development Life Cycle [J]. PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, : 165 - 176
- [25] The life-cycle approach to software development [J]. MANUFACTURING CHEMIST, 1996, 67 (01): : 28 - &
- [26] Support Vector Machine based, project simulation with focus on Security in software development Introducing Safe Software Development Life Cycle (SSDLC) model [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (11): : 393 - 400
- [27] Security issues in distributed software [J]. SOFTWARE ENGINEERING - ESEC/FSE '97, 1997, 1301 : 52 - 59
- [28] Software life cycle support. Decision based software development [J]. Proceedings of the IFIP World Computer Congress, 1992, 1
- [29] Ethical Software: Integrating Code of Ethics into Software Development Life Cycle [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2017, : 290 - 298
- [30] Secure Software Development Model: A Guide for Secure Software Life Cycle [J]. INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 724 - 728