[1]
Ava Jackson, “Effective Requirements Gathering for Software Security”, IJCST, vol. 7, no. 1, pp. 620-627, Mar. 2023.