@dblp

Capturing Security Requirements Using Essential Use Cases (EUCs).

, , , and . APRES, volume 432 of Communications in Computer and Information Science, page 16-30. Springer, (2014)

Links and resources

Tags