Proposed Algorithm for Identification of Vulnerabilities and Associated Misuse Cases Using CVSS, CVE Standards During Security Requirements Elicitation Phase
Crossref DOI link: https://doi.org/10.1007/978-981-10-5699-4_61
Published Online: 2017-11-25
Published Print: 2018
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Banerjee, C.
Banerjee, Arpita
Poonia, Ajeet Singh
Sharma, S. K.
License valid from 2017-11-25