Login / Signup

Checking threat modeling data flow diagrams for implementation conformance and security.

Marwan Abi-AntounDaniel WangPeter Torr
Published in: ASE (2007)
Keyphrases