Login / Signup
Engaging stakeholders during late stage security design with assumption personas.
Shamal Faily
Published in:
Inf. Comput. Secur. (2015)
Keyphrases
</>
functional requirements
knowledge based systems
database systems
building blocks
artificial intelligence
data integrity
case study
intrusion detection
security issues
computer aided
security systems
real time
design methodology
network security
design process
access control
website
neural network