Inproceedings,

Eliciting Security Requirements through Misuse Activities.

, , and .
DEXA Workshops, page 328-333. IEEE Computer Society, (2008)

Meta data

Tags

Users

  • @dblp

Comments and Reviews