43
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Eliciting security requirements with misuse cases

      ,
      Requirements Engineering
      Springer Nature

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references12

          • Record: found
          • Abstract: not found
          • Article: not found

          Handling obstacles in goal-oriented requirements engineering

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            From object-oriented to goal-oriented requirements analysis

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              New directions on agile methods: a comparative analysis

                Bookmark

                Author and article information

                Journal
                Requirements Engineering
                Requirements Eng
                Springer Nature
                0947-3602
                1432-010X
                January 2005
                June 2004
                : 10
                : 1
                : 34-44
                Article
                10.1007/s00766-004-0194-4
                c0661161-d436-4358-a3e4-d25d738a1e06
                © 2005
                History

                Comments

                Comment on this article