Login / Signup

Designing System Security with UML Misuse Deployment Diagrams.

Susan J. LinckeTimothy H. KnautzMisty D. Lowery
Published in: SERE (Companion) (2012)
Keyphrases