Continuous software security through security prioritisation meetings.
Inger Anne TøndelDaniela Soares CruzesPublished in: J. Syst. Softw. (2022)
Keyphrases
- information security
- security issues
- security requirements
- security policies
- computer security
- access control
- statistical databases
- intrusion detection
- information assurance
- security management
- functional requirements
- network security
- key management
- security analysis
- cyber attacks
- security problems
- data mining
- high security
- security vulnerabilities
- rfid tags
- network management
- sensor networks
- security properties
- database