R. A. Khan and K. Mustafa, Secured Requirement Specification Framework (SRSF), American Journal of Applied Sciences, vol.5, issue.12, pp.1622-1629, 2008.
DOI : 10.3844/ajassp.2008.1622.1629

URL : http://doi.org/10.3844/ajassp.2008.1622.1629

D. Burley and M. Bishop, Summit on Education in Secure Software: Final Report, National Science Foundation, 2011.

M. Howard, Lessons Learned from Five Years of Building More Secure Software, 2015.

M. Howard and D. Leblanc, Writing secure code: Practical strategies and techniques for secure application coding in a networked world, 2003.

B. Taylor and S. Azadegan, Threading secure coding principles and risk analysis into the undergraduate computer science and information systems curriculum, Proceedings of the 3rd annual conference on Information security curriculum development , InfoSecCD '06, pp.24-29, 2006.
DOI : 10.1145/1231047.1231053

T. Heyman, K. Yskout, R. Scandariato, and W. Joosen, An Analysis of the Security Patterns Landscape, Third International Workshop on Software Engineering for Secure Systems (SESS'07: ICSE Workshops 2007), 2007.
DOI : 10.1109/SESS.2007.4

N. Yoshioka, H. Washizaki, and K. Maruyama, A survey on security patterns. Progress in Informatics. Special Issue: The future of software engineering for security and privacy, pp.35-47, 2008.

O. Barzilay and C. Urquhart, Understanding reuse of software examples: A case study of prejudice in a community of practice, Information and Software Technology, vol.56, issue.12, pp.1613-1628, 2014.
DOI : 10.1016/j.infsof.2014.02.013

J. Dooley, Software Development and Professional Practice, Apress, 2011.
DOI : 10.1007/978-1-4302-3802-7

V. Pieterse and L. Marshall, What is a Design Pattern? SACLA, 1?25 Retrieved from http://web.up.ac.za/ecis, SACLA030.pdf 12. Syromiatnikov, A. & Weyns, D. A Journey through the Land of Model-View-Design Patterns IEEE/IFIP Conference on Software Architecture (WICSA) 2014 IEEE/IFIP Conference on Software Architecture (WICSA) 2014, pp.21-30, 2010.

M. Colesky, L. Futcher, and J. Van-niekerk, Design patterns for secure software development: demonstrating security through the MVC pattern, 15th Annual Conference on WWW Applications, pp.10-13, 2013.

J. Meier, A. Mackman, S. Vasireddy, M. Dunner, R. Escamilla et al., Improving Web Application Security: Threats and Countermeasures (p. 919), 2003.

B. Martin, M. Brown, A. Paller, D. Kirby, and S. Christey, 2011 CWE / SANS Top 25 Most Dangerous Software Errors. Retrieved from http, 2011.

H. Yu, N. Jones, G. Bullock, and X. Y. Yuan, Teaching secure software engineering: Writing secure code, 7th Central and Eastern European Software Engineering Conference, CEE-SECR 2011, pp.1-5, 2011.

N. Delessy-gassant and E. B. Fernandez, The Secure MVC pattern, 1st LACCEI International Symposium on Software Architecture and Patterns, pp.1-6, 2012.