Login / Signup

Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario.

Su-Jin BaekJung-Soo HanYoung-Jae Song
Published in: ICITCS (2011)
Keyphrases
  • detection method
  • databases
  • requirement analysis
  • data sets
  • computer vision
  • data analysis
  • pose estimation
  • software systems