Login / Signup

Argumentation-based security requirements elicitation: The next round.

Dan IonitaJan-Willem BulleeRoel J. Wieringa
Published in: ESPRE (2014)
Keyphrases