Author:
Abdelrazek M.,Grundy J.,Ibrahim A.
Reference49 articles.
1. A comparison of security requirements engineering methods;Fabian;Requir. Eng.,2010
2. WAF virtual patching challenge: securing WebGoat with ModSecurity;Barnett,2009
3. Security Engineering: A Guide to Building Dependable Distributed Systems;Anderson,2001
4. Goal-directed requirements acquisition;Dardenne,1993
5. Evaluating the effectiveness of a goal-oriented requirements engineering method;Al-Subaie,2006
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献