Author:
Scandariato Riccardo,Paci Federica,Sang Tran Le Minh,Labunets Katsiaryna,Yskout Koen,Massacci Fabio,Joosen Wouter
Publisher
Springer International Publishing
Reference39 articles.
1. Nuseibeh, B.: Weaving together requirements and architectures. IEEE Computer 34, 115–119 (2001)
2. Lecture Notes in Computer Science;T. Heyman,2011
3. Howard, M., Lipner, S.: The Security Development Lifecycle. Microsoft Press (2006)
4. McGraw, G.: Software Security: Building Security. Addison-Wesley (2006)
5. Lund, M.S., Solhaug, B., Stølen, K.: Model-Driven Risk Analysis: The CORAS Approach. Springer (2011)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. User-centric security: optimization of the security-usability trade-off;Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering;2015-08-30