Security Requirements Prioritization Techniques: A Survey and Classification Framework

datacite.relatedItem.firstPage450
datacite.relatedItem.issue4
datacite.relatedItem.relatedIdentifierTypeISSN
datacite.relatedItem.relatedItemIdentifier2674-113X
datacite.relatedItem.relationTypeIsPublishedIn
datacite.relatedItem.titleSoftware
datacite.relatedItem.volume1
dc.contributor.authorShada Khanneh
dc.contributor.authorVaibhav Anu
dc.date.accessioned2024-08-14T11:17:05Z
dc.date.available2024-08-14T11:17:05Z
dc.date.issued2022
dc.identifier.doihttps://doi.org/10.3390/software1040019
dc.identifier.otherjz000089-0013
dc.identifier.urihttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3822
dc.publisherMDPI AG
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.subject.ddc004
dc.titleSecurity Requirements Prioritization Techniques: A Survey and Classification Framework
dc.typeArticle
dcat.distribution.pdfhttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3823
dcat.distribution.supplierxmlhttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3824
dspace.entity.typeDataset
relation.isDistributionOfDatasete5d30ca6-cc7a-4a73-a815-9856a4d069d8
relation.isDistributionOfDatasetff519c64-708d-4b2c-976f-1be72c6dd1e5
relation.isDistributionOfDataset16538e10-d5a6-44bd-a203-5543bde0e6ba
relation.isDistributionOfDataset.latestForDiscoverye5d30ca6-cc7a-4a73-a815-9856a4d069d8
wdm.archivematicaaipuuid.original4b5e6400-4cd4-4579-840c-c66ce0843d88

Files

Collections