[Lecture Notes in Computer Science] Computational Intelligence and Security Volume 3802 || Building Security Requirements Using State Transition Diagram at Security Threat Location
Hao, Yue, Liu, Jiming, Wang, Yu-Ping, Cheung, Yiu-ming, Yin, Hujun, Jiao, Licheng, Ma, Jianfeng, Jiao, Yong-ChangVolume:
10.1007/11
Year:
2005
Language:
english
DOI:
10.1007/11596981_66
File:
PDF, 342 KB
english, 2005