Conference Paper Modeling and Utilizing Security Knowledge for Eliciting Security Requirements

阿部, 達也  ,  Abe, Tatsuya  ,  林, 晋平  ,  Hayashi, Shinpei  ,  佐伯, 元司  ,  SAEKI, MOTOSHI

Number of accesses :  

Other information