@dblp

Deriving security requirements from crosscutting threat descriptions.

, , and . AOSD, page 112-121. ACM, (2004)

Links and resources

Tags

community

  • @gelahi
  • @yijunyu
  • @dblp
  • @erikproper
@dblp's tags highlighted