Login / Signup
On the design of more secure software-intensive systems by use of attack patterns.
Michael Gegick
Laurie A. Williams
Published in:
Inf. Softw. Technol. (2007)
Keyphrases
</>
software intensive systems
real time
design patterns
information systems
cooperative
design process
authentication protocol
e learning
case study
low cost
software systems