Proposed Algorithm for Creation of Misuse Case Modeling Tree During Security Requirements Elicitation Phase to Quantify Security
2011 ◽
Vol 5
(4)
◽
pp. 8-30
2011 ◽
pp. 316-325
2017 ◽
Vol 14
(1-2)
◽
pp. 1-11
2018 ◽
Vol 60
(1)
◽
pp. 3-20
◽