Sign in

Eliciting Security Requirements by Misuse Cases.

Guttorm SindreAndreas L. Opdahl
Published in: TOOLS (37) (2000)
Keyphrases