Login / Signup
Problem-based Elicitation of Security Requirements - The ProCOR Method.
Roman Wirtz
Maritta Heisel
Rene Meis
Aida Omerovic
Ketil Stølen
Published in:
ENASE (2018)
Keyphrases
</>
security requirements
databases
association rules
software engineering