{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T13:53:44Z","timestamp":1770040424223,"version":"3.49.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,13]]},"DOI":"10.23919\/icact53585.2022.9728868","type":"proceedings-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T20:27:02Z","timestamp":1647030422000},"page":"313-316","source":"Crossref","is-referenced-by-count":8,"title":["The Impact of the Practical Security Test during the Software Development Lifecycle"],"prefix":"10.23919","author":[{"given":"Shiang-Jiun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yu-Chun","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Yi-Wei","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Cheng-Mou","family":"Chiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"What Is the Software Development Life Cycle (SDLC) and How Does It Work? | Synopsys"},{"key":"ref11","article-title":"Object Oriented Software Security in Design Phase","author":"ubaidullah bokhari","year":"2012"},{"key":"ref12","year":"0","journal-title":"Static Application Security Testing What Is SAST and How Does Static Code Analysis Work? | Synopsys"},{"key":"ref13","year":"0","journal-title":"Whitesource WhiteSource-Vulnerability-Database pdf (whitesourcesoftware com)"},{"key":"ref14","year":"0","journal-title":"Cybellum Cyber Digital Twins | Cybellum"},{"key":"ref15","year":"0","journal-title":"Building Security In Maturity Modell BSIMM"},{"key":"ref4","year":"2010","journal-title":"OSSTMM 3 (isecom org)"},{"key":"ref3","year":"2003","journal-title":"code documentation Excerpts pdf (buffalo edu)"},{"key":"ref6","year":"2013","journal-title":"2013_019_001_297287 pdf (cmu edu)"},{"key":"ref5","year":"2017","journal-title":"Basics of Security Testing with SDLC Integration - Advaiya"},{"key":"ref8","article-title":"IBM System Science Institute Relative Cost of Fixing Defects | Download Scientific Diagram (researchgate.net)","author":"blincoe","year":"2017"},{"key":"ref7","article-title":"Software Assurance Guidebook, NASA-GB-A201","year":"2004"},{"key":"ref2","article-title":"Strategic Planning for the Computer Security","author":"ruiz-vanoye","year":"2008"},{"key":"ref1","article-title":"Strategic Planning for the Computer Security: A Practice Case of an Electrical Research Institute","author":"ruiz-vanoye","year":"2014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1201\/b10978"}],"event":{"name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","location":"PyeongChang Kwangwoon_Do, Korea, Republic of","start":{"date-parts":[[2022,2,13]]},"end":{"date-parts":[[2022,2,16]]}},"container-title":["2022 24th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9728250\/9728768\/09728868.pdf?arnumber=9728868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T21:29:24Z","timestamp":1653341364000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9728868\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,13]]},"references-count":15,"URL":"https:\/\/doi.org\/10.23919\/icact53585.2022.9728868","relation":{},"subject":[],"published":{"date-parts":[[2022,2,13]]}}}