generation using model driven architecture: a
systematic mapping study. Journal of Computer
Languages, 56, 100935.
Jürjens J., Shabalin, P. (2007). Tools for secure systems
development with UML, International Journal on
Software Tools for Technology Transfer, 9:527–544.
Jürjens J. (2001). Modelling audit security for smart-card
payment schemes with UMLsec, In 16
th
International
Conference on Information Security (IFIP/SEC”01),
IFIP. Kluwer Academic Publishers, 2001, pp. 93–108.
Jurjens J., Schreck J., Bartmann P. (2008). Model-based
security analysis for mobile communications. In 30
th
International Conference on Software Engineering
(ICSE 2008). 10-18 May, 2008, Leipzig, Germany
Sklavos N., Hubner M., Goehringer D., Kitsos P. (2014).
System-level design methodologies for
telecommunication, Springer
Schneider, K., Knauss, E., Houmb, S., Islam, S., Jürjens, J.
(2012). Enhancing security requirements engineering
by organisational learning, Requirements Engineering
Journal (REJ), vol. 17, no. 1, 35–56.
Ramadan, Q., Salnitri, M., Strüber, D., Jürjens, J., Giorgini,
P. (2017). From secure business process modeling to
design-level security verification. In ACM/IEEE 20
th
International Conference on Model Driven
Engineering Languages and Systems, 17-22 Sept. 2017,
Austin, TX, USA.
Jürjens, J. (2001). Towards development of secure systems
using UMLsec. In International Conference on
Fundamental Approaches to Software Engineering,
LNCS 2029, pp. 187-200, Springer, Berlin, Heidelberg
Burger, J., Gartner, S., Ruhroth, T., Zweihoff, J., Jurjens, J.,
Schneider, K. (2015). Restoring security of long-living
systems by co-evolution. In IEEE 39
th
Annual
International Computers, Software & Applications
Conference, 1-5 July 2015, Taichung, Taiwan
Sedaghatbaf, A., Azgomi, M.A. (2016). Quantitative
evaluation of software security: an approach based on
UML/SecAM and evidence theory, The ISC Int’l
Journal of Information Security, Vol. 8, No. 2, 143-155.
Rehman, S., Allgaier, C., Gruhn, V. (2018). Security
requirements engineering: a framework for cyber-
physical systems. In International Conference on
Frontiers of Information Technology, 17-19 Dec. 2018,
Islamabad, Pakistan.
Muneer, S., Nadeem, M., Kasi, B., Yousaf, M.H. (2020).
Evaluating the effectiveness of notations for designing
security aspects. In International Conference on
Advanced Communications Technology (ICACT), 16-
19 Feb. 2020, Phoenix Park, South Korea.
Hu, X., Zhuang, Y., Zhang, F. (2020). A security modeling
and verification method of embedded software based on
Z and MARTE, Computers & Security, 88 (2020)
101615.
Arogundade O.T., Onilede O., Misra S., Abayomi-Alli O.,
Odusami M., Oluranti J. (2021) From modeling to code
generation: an enhanced and integrated approach. In
Singh P.K., Polkowski Z., Tanwar S., Pandey S.K.,
Matei G., Pirvu D. (eds) Innovations in Information and
Communication Technologies (IICT-2020). Advances
in Science, Technology & Innovation (IEREK
Interdisciplinary Series for Sustainable Development).
Springer, Cham. https://doi.org/10.1007/978-3-030-
66218-9_50.
Wohlin C, Runeson P,HostM, OhlssonMC, Regnell
B,Wesslen A. (2012). Experimentation in software
engineering, Springer, Berlin/Heidelberg, Germany.
Anton V. Uzunov, Eduardo B. Fernandez, Katrina Falkner
(2015). ASE: a comprehensive pattern-driven security
methodology for distributed systems, Computer
Standards & Interfaces, 41, 112–137.
Sommerville, I. (2015). Software engineering, Pearson,
England, 10
th
edition.
Doan, T. Demurjian, S. Ting, T., Ketterl, A. (2004). Mac
and uml for secure software design. In Proceedings of
the 2004 ACM workshop on Formal methods in security
engineering. ACM, 75–85.
Ebad, S.A., Darem A.A., Abawajy J.H. (2021). Measuring
software obfuscation quality– a systematic literature
review, IEEE Access, vol. 9, pp. 99024-99038.