Login / Signup

Effective Security Requirements Analysis: HAZOP and Use Cases.

Thitima SrivatanakulJohn A. ClarkFiona Polack
Published in: ISC (2004)
Keyphrases
  • requirements analysis
  • goal oriented
  • artificial intelligence
  • knowledge base
  • intrusion detection