^ abJohnson, Brittany; Song, Yooki; Murphy-Hill, Emerson; Bowdidge, Robert (May 2013). “Why don't software developers use static analysis tools to find bugs?”. 2013 35th International Conference on Software Engineering (ICSE). pp. 672–681. doi:10.1109/ICSE.2013.6606613.
ISBN978-1-4673-3076-3
^ ab Oyetoyan, Tosin Daniel; Milosheska, Bisera; Grini, Mari (May 2018). “Myths and Facts About Static Application Security Testing Tools: An Action Research at Telenor Digital”. International Conference on Agile Software Development. (Springer): 86–103.
^ ab Parizi, R. M.; Qian, K.; Shahriar, H.; Wu, F.; Tao, L. (July 2018). “Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools”. 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE. pp. 825–826. doi:10.1109/COMPSAC.2018.00139.
ISBN978-1-5386-2666-5
^ Chess, B.; McGraw, G. (December 2004). “Static analysis for security”. IEEE Security & Privacy (IEEE) 2 (6): 76–79. doi:10.1109/MSP.2004.111.
^ Mezo, Peter; Jain, Radhika (December 2006). “Agile Software Development: Adaptive Systems Principles and Best Practices”. Information Systems Management23 (3): 19–30. doi:10.1201/1078.10580530/46108.23.3.20060601/93704.3.
^ Livshits, V.B.; Lam, M.S. (May 2006). “Finding Security Vulnerabilities in Java Applications with Static Analysis”. USENIX Security Symposium14: 18.
^ Jovanovic, N.; Kruegel, C.; Kirda, E. (May 2006). “Pixy: A static analysis tool for detecting Web application vulnerabilities”. 2006 IEEE Symposium on Security and Privacy (S&P'06). IEEE. pp. 359–368. doi:10.1109/SP.2006.29.
ISBN0-7695-2574-1
^ Xianyong, Meng; Qian, Kai; Lo, Dan; Bhattacharya, Prabir; Wu, Fan (June 2018). “Secure Mobile Software Development with Vulnerability Detectors in Static Code Analysis”. 2018 International Symposium on Networks, Computers and Communications (ISNCC). pp. 1–4. doi:10.1109/ISNCC.2018.8531071.
ISBN978-1-5386-3779-1
^
Siavvas, M.; Tsoukalas, D.; Janković, M.; Kehagias, D.; Chatzigeorgiou, A.; Tzovaras, D.; Aničić, N.; Gelenbe, E. (August 2019). “An Empirical Evaluation of the Relationship between Technical Debt and Software Security”. In Konjović, Z.; Zdravković, M.; Trajanović, M. (eds.). International Conference on Information Society and Technology 2019 Proceedings (Data set). Vol. 1. pp. 199–203. doi:10.5281/zenodo.3374712.
^ Arreaza, Gustavo Jose Nieves (June 2019). “Methodology for Developing Secure Apps in the Clouds. (MDSAC) for IEEECS Confererences”. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE. pp. 102–106. doi:10.1109/CSCloud/EdgeCom.2019.00-11.
ISBN978-1-7281-1661-7