Login / Signup
Investigating security threats in architectural context: Experimental evaluations of misuse case maps.
Péter Kárpáti
Andreas L. Opdahl
Guttorm Sindre
Published in:
J. Syst. Softw. (2015)
Keyphrases
</>
security threats
experimental evaluation
security issues
key management
anomaly detection
software architecture
database
information systems
distributed systems
intrusion detection
intrusion detection system
security mechanisms