Sign in

Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems.

Naveed IkramSurayya SiddiquiNaurin Farooq Khan
Published in: EmpiRE (2014)
Keyphrases