Login / Signup

Empirical evaluation of a privacy-focused threat modeling methodology.

Kim WuytsRiccardo ScandariatoWouter Joosen
Published in: J. Syst. Softw. (2014)
Keyphrases