Research Article
Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model
Table 1
Comparison of related works.
| Related works | Secure practices during the development process | Lightweight approach | In-depthsecurity requirements |
| [17, 18] | ✓ | ✗ | ✗ | [20] | ✓ | ✗ | ✗ | [21] | ✗ | ✗ | ✓ | [22] | ✗ | ✗ | ✓ | [26–29] | ✓ | ✗ | ✓ | [31] | ✓ | ✗ | ✗ | PDWM | ✓ | ✓ | ✓ |
|
|