Author:
Parveen Azra,Khan Zishan Husain,Ahmad Syed Naseem
Publisher
Springer Science and Business Media LLC
Reference40 articles.
1. Glinz, M.: On non-functional requirements. In: Proceedings of the 15th IEEE International requirements engineering conference (RE-2007), 21–26 (2007)
2. Pathak, N., Singh, B.M., Sharma, G.: UML 2.0 based framework for the development of secure web application. BVICAM’s Int. J. Inf. Technol. Springer 9(1), 101–109 (2017)
3. Mahfuth, A., Yussof, S., Baker, A.A., and Ali N.: A systematic literature review: information security culture. In proceedings: IEEE International Conference on Research and Innovation in Information Systems, pp. 1–6 (2017)
4. Huang, Z., Liu, S., Mao, X., Chen, K., Li, J.: Insight of the protection for data security under selective opening attacks. Inf. Sci. 412–413, 223–241 (2017)
5. Stergiou, C., Psannis, K.E., Kim, B.-G., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener Comput Syst 78, 964–975 (2018)
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献