Back to Results
First PageMeta Content



A Model for Structuring and Reusing Security Requirements Sources and Security Requirements Christian Schmitt1 and Peter Liggesmeyer2, 3 1
Add to Reading List

Document Date: 2015-03-12 04:54:52


Open Document

File Size: 1,26 MB

Share Result on Facebook
UPDATE