Login / Signup
Architectural Modeling to Verify Security and Nonfunctional Behavior.
Jörgen Hansson
Lutz Wrage
Peter H. Feiler
John Morley
Bruce A. Lewis
Jérôme Hugues
Published in:
IEEE Secur. Priv. (2010)
Keyphrases
</>
functional requirements
information security
case study
software architecture
behavioral models
neural network
data mining
network security
human behavior
security issues
security mechanisms
access control
computer security
data security
information assurance