Research Article
Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model
Table 1
Comparison of related works.
| | Related works | Secure practices during the development process | Lightweight approach | In-depthsecurity requirements |
| | [17, 18] | ✓ | ✗ | ✗ | | [20] | ✓ | ✗ | ✗ | | [21] | ✗ | ✗ | ✓ | | [22] | ✗ | ✗ | ✓ | | [26–29] | ✓ | ✗ | ✓ | | [31] | ✓ | ✗ | ✗ | | PDWM | ✓ | ✓ | ✓ |
|
|