Security Requirements Prioritization Techniques: A Survey and Classification Framework
datacite.relatedItem.firstPage | 450 | |
datacite.relatedItem.issue | 4 | |
datacite.relatedItem.relatedIdentifierType | ISSN | |
datacite.relatedItem.relatedItemIdentifier | 2674-113X | |
datacite.relatedItem.relationType | IsPublishedIn | |
datacite.relatedItem.title | Software | |
datacite.relatedItem.volume | 1 | |
dc.contributor.author | Shada Khanneh | |
dc.contributor.author | Vaibhav Anu | |
dc.date.accessioned | 2024-08-14T11:17:05Z | |
dc.date.available | 2024-08-14T11:17:05Z | |
dc.date.issued | 2022 | |
dc.identifier.doi | https://doi.org/10.3390/software1040019 | |
dc.identifier.other | jz000089-0013 | |
dc.identifier.uri | https://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3822 | |
dc.publisher | MDPI AG | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.subject.ddc | 004 | |
dc.title | Security Requirements Prioritization Techniques: A Survey and Classification Framework | |
dc.type | Article | |
dcat.distribution.pdf | https://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3823 | |
dcat.distribution.supplierxml | https://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3824 | |
dspace.entity.type | Dataset | |
relation.isDistributionOfDataset | e5d30ca6-cc7a-4a73-a815-9856a4d069d8 | |
relation.isDistributionOfDataset | ff519c64-708d-4b2c-976f-1be72c6dd1e5 | |
relation.isDistributionOfDataset | 16538e10-d5a6-44bd-a203-5543bde0e6ba | |
relation.isDistributionOfDataset.latestForDiscovery | e5d30ca6-cc7a-4a73-a815-9856a4d069d8 | |
wdm.archivematicaaipuuid.original | 4b5e6400-4cd4-4579-840c-c66ce0843d88 |