Login / Signup
Developing Abuse Cases Based on Threat Modeling and Attack Patterns.
Xiaohong Yuan
Emmanuel Borkor Nuakoh
Imano Williams
Huiming Yu
Published in:
J. Softw. (2015)
Keyphrases
</>
countermeasures
data mining techniques
real time
design patterns
software engineering
pattern analysis
modeling framework
previously unknown
pattern extraction
sir model