Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources
Complex Systems Informatics and Modeling Quarterly
doi 10.7250/csimq.2015-3.02
Full Text
Open PDFAbstract
Available in full text
Date
July 30, 2015
Authors
Publisher
Riga Technical University