|
ComputingReviews.com
|
Finding and resolving security misusability with misusability cases Faily S., Fléchais I. Requirements Engineering21(2):209-223,2016.Type:Article |
|
|
|
Published By: Springer-Verlag |
|
|
|
|
|
|
|
|
Use your personal or institutional subscription to read the fulltext of the article.
|
|
|
|
|
|
|
|
|
|
|
|