Login / Signup

A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER.

Sarah ElderAnna MattapallilLaurie A. Williams
Published in: HotSoS (2018)
Keyphrases
  • security requirements
  • databases
  • database
  • source code
  • access control
  • intrusion detection