Login / Signup

A descriptive study of Microsoft's threat modeling technique.

Riccardo ScandariatoKim WuytsWouter Joosen
Published in: Requir. Eng. (2015)
Keyphrases