Login / Signup
Finding and resolving security misusability with misusability cases.
Shamal Faily
Ivan Flechais
Published in:
Requir. Eng. (2016)
Keyphrases
</>
security requirements
information security
access control
security systems
real time
case study
intrusion detection
network security
security policies
statistical databases
low cost
case base
computer security
data security
security management