Cited By
View all- Banerjee CBanerjee APoonia ASharma S(2017)Proposed Algorithm for Identification of Vulnerabilities and Associated Misuse Cases Using CVSS, CVE Standards During Security Requirements Elicitation PhaseSoft Computing: Theories and Applications10.1007/978-981-10-5699-4_61(651-658)Online publication date: 25-Nov-2017
- Faniyi FBahsoon REvans AKazman R(2011)Evaluating Security Properties of Architectures in Unpredictable EnvironmentsProceedings of the 2011 Ninth Working IEEE/IFIP Conference on Software Architecture10.1109/WICSA.2011.25(127-136)Online publication date: 20-Jun-2011