Sign in

Eliciting security requirements with misuse cases.

Guttorm SindreAndreas L. Opdahl
Published in: Requir. Eng. (2005)
Keyphrases