C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
The Application of useless Japanese Inventions for Requirements Elicitation in Information Security.
Anton Partridge
Shamal Faily
Published in:
BCS HCI (2016)
Keyphrases
</>
information security
requirements elicitation
information systems
countermeasures
security requirements
network security
case study
security issues
technical issues
security level
intrusion detection