Sign in

Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations.

Péter KárpátiAndreas L. OpdahlGuttorm Sindre
Published in: ARES (2011)
Keyphrases