Old Web
English
Sign In
Acemap
>
Paper
>
Problem-based Elicitation of Security Requirements - The ProCOR Method.
Problem-based Elicitation of Security Requirements - The ProCOR Method.
2018
Roman Wirtz
Maritta Heisel
Rene Meis
Aida Omerovic
Ketil Stølen
Keywords:
Data mining
Systems engineering
Computer science
Correction
Source
Cite
Save
Machine Reading By IdeaReader
7
References
4
Citations
NaN
KQI
[]