Login / Signup

Prioritisation and Selection of Software Security Activities.

David ByersNahid Shahmehri
Published in: ARES (2009)
Keyphrases
  • selection strategy
  • activity recognition
  • data sets
  • databases
  • machine learning
  • three dimensional
  • lower bound
  • human activities
  • selection criteria