Login / Signup

Holistic security requirements analysis: An attacker's perspective.

Tong LiElda PajaJohn MylopoulosJennifer HorkoffKristian Beckers
Published in: RE (2015)
Keyphrases