3,051 followers
Good article: Eliciting security requirements with misuse cases https://t.co/3MjSsUnWL6 #cybersecurity #requirements #re #software
Good article: Eliciting security requirements with misuse cases https://t.co/3MjSsUnWL6 #cybersecurity #requirements #re #software
Security's always a hot topic! https://t.co/B7LYOIdSOy
And the most cited paper is: Eliciting security requirements with misuse cases by Sindre & @andreaslo 2005, 915+ cit https://t.co/D01ivC3toW
メモ RT Eliciting security requirements with misuse cases http://t.co/d6qzb6ZR