Login / Signup

Using templates to elicit implied security requirements from functional requirements - a controlled experiment.

Maria RiazJohn SlankasJason Tyler KingLaurie A. Williams
Published in: ESEM (2014)
Keyphrases