Describing early security requirements using use case maps

Jameleddine Hassine*, Abdelwahab Hamou-Lhadj

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Fingerprint

Dive into the research topics of 'Describing early security requirements using use case maps'. Together they form a unique fingerprint.

Computer Science