Login / Signup
Evaluating software security maturity using OWASP SAMM: Different approaches and stakeholders perceptions.
Davide Fucci
Emil Alégroth
Michael Felderer
Christoffer Johannesson
Published in:
J. Syst. Softw. (2024)
Keyphrases
</>
databases
database
information retrieval
computer vision
alternative approaches
data mining
learning algorithm
information systems
bayesian networks
multiscale
hidden markov models
software engineering
data mining techniques
attitudes toward