{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T05:44:56Z","timestamp":1773639896610,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3062388","type":"journal-article","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T20:48:46Z","timestamp":1614372526000},"page":"36852-36867","source":"Crossref","is-referenced-by-count":32,"title":["Systematic Mapping of the Literature on Secure Software Development"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0230-5812","authenticated-orcid":false,"given":"Hernan","family":"Nina","sequence":"first","affiliation":[{"name":"Maestr\u00eda en Inform\u00e1tica, Pontificia Universidad Cat&#x00F3;lica del Per&#x00FA;, Lima, Peru"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4001-8072","authenticated-orcid":false,"given":"Jose Antonio","family":"Pow-Sang","sequence":"additional","affiliation":[{"name":"Maestr\u00eda en Inform\u00e1tica, Pontificia Universidad Cat&#x00F3;lica del Per&#x00FA;, Lima, Peru"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2601-2638","authenticated-orcid":false,"given":"Monica","family":"Villavicencio","sequence":"additional","affiliation":[{"name":"Facultad de Ingenier\u00eda en Electricidad y Computaci\u00f3n, Escuela Superior Polit&#x00E9;cnica del Litoral, Guayaquil, Ecuador"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/bs.adcom.2015.11.003","article-title":"Security testing: A survey","volume":"101","author":"felderer","year":"2016","journal-title":"Advances in Computers"},{"key":"ref32","article-title":"Software application security test strategy with lean canvas design","author":"nidagundi","year":"2018","journal-title":"Proc Int Conf Inf Technol"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2018.00018"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2016.7737238"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.11.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05345-1_37"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.19153\/cleiej.19.3.5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/APSECW.2017.29"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.10.001"},{"key":"ref15","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1201\/9781315154855-2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1097\/XEB.0000000000000062"},{"key":"ref18","author":"petticrew","year":"2008","journal-title":"Systematic Reviews in the Social Sciences A Practical Guide"},{"key":"ref19","author":"society","year":"2014","journal-title":"Guide to the Software Engineering Body of Knowledge (Swebok(r)) Version 3 0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.04.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.155"},{"key":"ref27","article-title":"Security design patterns","author":"rodriguez","year":"2003","journal-title":"Proc 19th Annu Comput Secur Appl Conf (ACSAC)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3196369.3196385"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23276-8_28"},{"key":"ref29","article-title":"Attack patterns as a knowledge resource for building secure software","author":"barnum","year":"2007","journal-title":"Proc OMG Softw Assurance Workshop Cigital"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07452-8_10"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2018.00080"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4018\/ijsse.2014100103"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.00141"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-015-0220-8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183462"},{"key":"ref20","author":"conklin","year":"2019","journal-title":"All-In-One CISSP Certification Exam Guide"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ITMC.2014.6918615"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2898375.2898380"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2019.00023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664254"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-06708-3_1"},{"key":"ref25","author":"winograd","year":"2007","journal-title":"Software Security Assurance A State-of-the-Art Report (SOAR)"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09363884.pdf?arnumber=9363884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T19:58:48Z","timestamp":1662667128000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9363884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3062388","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}