Inproceedings,

Holistic security requirements analysis: An attacker's perspective.

, , , , and .
RE, page 282-283. IEEE Computer Society, (2015)

Meta data

Tags

Users

  • @dblp

Comments and Reviews