Developing abuse cases based on threat modeling and attack patterns

Research output: Contribution to conferencePaper

Original languageEnglish
StatePublished - 2015

Cite this