A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements
2019 ◽
Vol 15
(3)
◽
pp. 1578
Keyword(s):
1991 ◽
Vol 138
(3)
◽
pp. 307
◽
1998 ◽
Vol 37
(01)
◽
pp. 16-25
◽
2019 ◽
Vol 22
(4)
◽
pp. 336-341
Keyword(s):