@yijunyu

Deriving security requirements from crosscutting threat descriptions

, , and . Aspect-Oriented Software Development, page 112--121. (2004)

Links and resources

Tags