Login / Signup

Security Requirements Prioritization Based on Threat Modeling and Valuation Graph.

Keunyoung ParkSang Guun YooJuho Kim
Published in: ICHIT (2) (2011)
Keyphrases