Author:
Rakesh Phanindra A.,Narasimha V. B.,PhaniKrishna Ch. V.
Reference10 articles.
1. http://eyefodder.com/2011/06/quality-software-non-functional-requirements.html
2. Khatter, K., Kalia, A.: Impact of non-functional requirements on requirements evolution. In: 6th International Conference on Emerging Trends in Engineering and Technology (ICETET), pp. 61–68. IEEE (2013)
3. https://en.wikipedia.org/wiki/Web_application_security
4. Shuaibu, B.M., Norwawi, N.M., Selamat, M.H., Al-Alwani, A.: Systematic review of web application security development model, Artif. Intell. Rev. 43(2), pp. 259–276 (2015)
5. Aydal, E.G., Paige, R.F., Chivers, H., Brooke, P.J.: Security planning and refactoring in extreme programming. Lecture Notes in Computer Science, vol. 4044 (2006)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献