Security Requirements analysis methods: How To Improve?

  • Mick Schulz
  • Anders Petersen

Abstract

Restricted access! The contents are blocked by the system. Please consult the technical assistant.

Published
2013-03-06
How to Cite
Schulz, M., & Petersen, A. (2013). Security Requirements analysis methods: How To Improve?. International Journal of Computer (IJC), 5(1). Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/71
Section
Articles