Publication | Closed Access
A comparison of security requirements engineering methods
238
Citations
56
References
2009
Year
Hardware SecuritySoftware RequirementSecurity ModellingEngineeringRequirement EngineeringInformation SecurityDesignSecuritySystems EngineeringSoftware EngineeringSoftware AnalysisSoftware Design
| Year | Citations | |
|---|---|---|
Page 1
Page 1