Font Size: a A A
Keyword [security requirement]
Result: 21 - 28 | Page: 2 of 2
21. Analysis And Implementation. Xx Enterprise Network Security
22. Research On Proxy Electronic Voting Protocol
23. An Approach Of Eliciting Security Requirements Based On Knowledge Base
24. Level Driven Security Requirement Analysis Method Based On CC Standard
25. The Automatic Acquisition Method And Tool For Software Security Requirement Based On Level And Formal Modeling
26. The Design And Implementation Of Tool For Eliciting Software Security Requirement Based On Security Requirement Template
27. Design And Implementation Of Information Security Schema For An Network
28. A Security Requirement Recommendation Method Based On Sensitive APIs For Android Applications
  <<First  <Prev  Next>  Last>>  Jump to