Article,

Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources.

, and .
Complex Syst. Informatics Model. Q., (2015)

Meta data

Tags

Users

  • @dblp

Comments and Reviews