Login / Signup

Existing Vulnerability Information in Security Requirements Elicitation.

Md Rayhan AminTanmay Bhowmik
Published in: RE Workshops (2022)
Keyphrases
  • information sources
  • information flow
  • requirements elicitation
  • databases
  • end users
  • information security
  • machine learning
  • case study
  • relational databases
  • software development
  • security problems
  • security risks