{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:12:00Z","timestamp":1776283920971,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472566","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Security Best Practices and Tools for the Software Development Lifecycle"],"prefix":"10.1109","author":[{"given":"Alin-Marius","family":"Stanciu","sequence":"first","affiliation":[{"name":"University Politehnica Timisoara,Department of Computer and Information Technology,Timisoara,Romania"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECET58911.2023.10389547"},{"key":"ref2","article-title":"Shifting Security Left: A Qualitative Study","volume-title":"Diss.","author":"Butter","year":"2024"},{"issue":"1","key":"ref3","first-page":"61","article-title":"A cost-optimization scheme using security vulnerability measurement for efficient security enhancement","volume":"16","author":"Park","year":"2020","journal-title":"Journal of Information Processing Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102747"},{"key":"ref5","article-title":"Importance of Secure Software Development for the Software Development at Different SDLC Phases","author":"Hassan","year":"2024","journal-title":"Authorea Preprints"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s20205897"},{"key":"ref7","article-title":"Can we trust large language models generated code? A framework for in-context learning, security patterns, and code evaluations across diverse LLMs","author":"Mohsin","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.15680\/ijirset.2024.1305590"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC51774.2021.00138"},{"key":"ref10","volume-title":"Application of SIEM\/UEBA\/SOAR\/SOC (Cyber SUSS) Concepts on MSCS 6560 Computer Lab","author":"Singh","year":"2020"},{"issue":"12","key":"ref11","first-page":"1","article-title":"Exploration of Advanced Persistent Threats: Techniques, Mitigation Strategies, and Impacts on Critical Infrastructure","volume":"8","author":"Yusof","year":"2024","journal-title":"International Journal of Advanced Cybersecurity Systems, Technologies, and Applications"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.33093\/jiwe.2025.4.1.7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.241357"},{"key":"ref14","article-title":"Improving Transparency, Trust, and Automation in the Software Supply Chain","author":"Benedetti","year":"2025"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-025-00552-6"},{"key":"ref16","article-title":"IBM releases fully homomorphic encryption toolkit for MacOS and iOS; Linux and Android coming soon","author":"Bergamaschi","year":"2024","journal-title":"Quantum"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.30574\/wjaets.2024.11.1.0009"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NoF62948.2024.10741441"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/15228053.2022.2041890"},{"key":"ref20","article-title":"Analysis of Tools for Static Security Testing of Applications","volume-title":"BS thesis","author":"Golovyrin","year":"2023"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/app10249119"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3475716.3475769"},{"key":"ref23","volume-title":"The Ultimate Kali Linux Book: Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-ng, and Empire","author":"Singh","year":"2022"},{"key":"ref24","article-title":"Network Hardening of Multilayer Switch","author":"Pekkanen","year":"2021"},{"key":"ref25","article-title":"Holistic Security and Risk Intelligence: Are Current Risk Management Methods Leading to Breach?","author":"Middleton","year":"2023","journal-title":"Authorea Preprints"},{"key":"ref26","article-title":"Automatic event categorizer for SIEM","volume-title":"Proceedings of the 31st Annual International Conference on Computer Science and Software Engineering","author":"Hossain"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.016240"},{"issue":"2","key":"ref28","first-page":"100","article-title":"Audit Configuration and Vulnerability Router on Diskominfos of Bali Province","volume":"6","author":"Herdiana","year":"2021","journal-title":"Ojs. Unud. Ac. Id"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472566.pdf?arnumber=11472566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:23:07Z","timestamp":1776280987000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472566","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}