Login / Signup

Deriving security requirements from crosscutting threat descriptions.

Charles B. HaleyRobin C. LaneyBashar Nuseibeh
Published in: AOSD (2004)
Keyphrases