1.
Ava Jackson. Effective Requirements Gathering for Software Security. IJCST [Internet]. 2023Mar.30 [cited 2025Jun.16];7(1):620-7. Available from: https://ijcst.com.pk/index.php/IJCST/article/view/348