Sign in

Validating Security Requirement Specifications through the use of a Knowledge Graph.

Lynn Vonder HaarSarah A. ReynoldsTyler ProckoOmar Ochoa
Published in: ICSC (2023)
Keyphrases