Article ID Journal Published Year Pages File Type
6948269 Information and Software Technology 2015 83 Pages PDF
Abstract
Using our proposal, developers, architects and researchers can analyze and engineer security methodologies in a structured, systematic fashion, taking into account all security methodology aspects.
Related Topics
Physical Sciences and Engineering Computer Science Human-Computer Interaction
Authors
, , ,