Cargando…
An Efficient Identification of Security Threats in Requirement Engineering Methodology
Today, we completely rely on Information Technology (IT) applications for every aspect of daily life, including business and online transactions. In addition to using these IT-enabled applications for business purposes, we also use WhatsApp, Facebook, and a variety of other IT applications to commun...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9410943/ https://www.ncbi.nlm.nih.gov/pubmed/36035846 http://dx.doi.org/10.1155/2022/1872079 |