Login / Signup

Automated analysis of security requirements through risk-based argumentation.

Yijun YuVirginia N. L. FranqueiraThein Than TunRoel J. WieringaBashar Nuseibeh
Published in: J. Syst. Softw. (2015)
Keyphrases