Login / Signup
Integrating privacy requirements considerations into a security requirements engineering method and tool.
Nancy R. Mead
Seiya Miyazaki
Justin Zhan
Published in:
Int. J. Inf. Priv. Secur. Integr. (2011)
Keyphrases
</>
requirements engineering
software engineering
input data
information systems
wireless sensor networks
intrusion detection
literature review