Cargando…

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Today, we completely rely on Information Technology (IT) applications for every aspect of daily life, including business and online transactions. In addition to using these IT-enabled applications for business purposes, we also use WhatsApp, Facebook, and a variety of other IT applications to commun...

Descripción completa

Detalles Bibliográficos
Autores principales: Subha, R., Haldorai, Anandakumar
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9410943/
https://www.ncbi.nlm.nih.gov/pubmed/36035846
http://dx.doi.org/10.1155/2022/1872079