@dblp

A Methodology for Mining Security Tactics from Security Patterns.

, , and . HICSS, page 1-5. IEEE Computer Society, (2010)

Links and resources

Tags