Login / Signup
The Application of useless Japanese Inventions for Requirements Elicitation in Information Security.
Anton Partridge
Shamal Faily
Published in:
BCS HCI (2016)
Keyphrases
</>
information security
requirements elicitation
information systems
countermeasures
security requirements
network security
case study
security issues
technical issues
security level
intrusion detection