Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

Complex Systems Informatics and Modeling Quarterly
doi 10.7250/csimq.2015-3.02
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Riga Technical University