Login / Signup
From misuse cases to mal-activity diagrams: bridging the gap between functional security analysis and design.
Mohamed El-Attar
Published in:
Softw. Syst. Model. (2014)
Keyphrases
</>
security analysis
public key
case study
sequence diagrams
database
data structure
multi agent systems
image quality
object oriented systems
activity diagrams