Login / Signup

Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources.

Christian SchmittPeter Liggesmeyer
Published in: Complex Syst. Informatics Model. Q. (2015)
Keyphrases