Login / Signup
Existing Vulnerability Information in Security Requirements Elicitation.
Md Rayhan Amin
Tanmay Bhowmik
Published in:
RE Workshops (2022)
Keyphrases
</>
information sources
information flow
requirements elicitation
databases
end users
information security
machine learning
case study
relational databases
software development
security problems
security risks