Adding Threat During Software Requirements Elicitation and Prioritization
International Journal of Computer Applications
doi 10.5120/200-339
Full Text
Open PDFAbstract
Available in full text
Date
February 25, 2010
Authors
Publisher
Foundation of Computer Science