Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions Conference Paper uri icon

publication date

  • 2012