Login / Signup

A technique to include computer security, safety, and resilience requirements as part of the requirements specification.

D. N. J. MostertSebastiaan H. von Solms
Published in: J. Syst. Softw. (1995)
Keyphrases