"Extrapolating security requirements to an established software process: ..."

Galoh Rashidah Haron, Kang Siong Ng (2011)

Details and statistics

DOI:

access: closed

type: Conference or Workshop Paper

metadata version: 2021-08-09

a service of  Schloss Dagstuhl - Leibniz Center for Informatics