Login / Signup
A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER.
Sarah Elder
Anna Mattapallil
Laurie A. Williams
Published in:
HotSoS (2018)
Keyphrases
</>
security requirements
databases
database
source code
access control
intrusion detection