![](/img/cover-not-exists.png)
Experimental comparison of attack trees and misuse cases for security threat identification
Andreas L. Opdahl, Guttorm SindreVolume:
51
Year:
2009
Language:
english
Pages:
17
DOI:
10.1016/j.infsof.2008.05.013
File:
PDF, 640 KB
english, 2009