Article,

Eliciting security requirements with misuse cases

, and .
Requir. Eng., 10 (1): 34--44 (2005)
DOI: http://dx.doi.org/10.1007/s00766-004-0194-4

Meta data

Tags

Users

  • @gelahi

Comments and Reviews