Author:
Santos Joanna C. S.,Suloglu Selma,Cataño Néstor,Mirakhorli Mehdi
Publisher
Springer International Publishing
Reference33 articles.
1. SPEculative and Exporatory Design in System engineering. http://www.speeds.eu.com/
2. Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 3rd edn. Addison-Wesley Professional (2012)
3. Berger, B.J., Sohr, K., Koschke, R.: Extracting and analyzing the implemented security architecture of business applications. In: 17th European Conference on Software Maintenance and Reengineering (CSMR), pp. 285–294. IEEE (2013). https://doi.org/10.1109/CSMR.2013.37
4. Lecture Notes in Computer Science;BJ Berger,2016
5. Bodeau, D., Graubart, R.: Cyber resiliency design principles. MITRE (2017)