Login / Signup
Effective Security Requirements Analysis: HAZOP and Use Cases.
Thitima Srivatanakul
John A. Clark
Fiona Polack
Published in:
ISC (2004)
Keyphrases
</>
requirements analysis
goal oriented
artificial intelligence
knowledge base
intrusion detection