Login / Signup

Logic-based methodology to help security architects in eliciting high-level network security requirements.

Romain LabordeSravani Teja BulusuAhmad Samer WazanFrançois BarrèreAbdelmalek Benzekri
Published in: SAC (2019)
Keyphrases