Inproceedings,

Managing security requirements patterns using feature diagram hierarchies.

, , , and .
RE, page 193-202. IEEE Computer Society, (2014)

Meta data

Tags

Users

  • @dblp

Comments and Reviews