Shada KhannehVaibhav Anu2024-08-142024-08-142022jz000089-0013https://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3822004Security Requirements Prioritization Techniques: A Survey and Classification FrameworkArticlehttps://doi.org/10.3390/software1040019