Login / Signup

Problem-based Elicitation of Security Requirements - The ProCOR Method.

Roman WirtzMaritta HeiselRene MeisAida OmerovicKetil Stølen
Published in: ENASE (2018)
Keyphrases
  • security requirements
  • databases
  • association rules
  • software engineering