Keeping Ahead of Our Adversaries.

IEEE Software(2016)

引用 9|浏览52
暂无评分
摘要
Building a secure system requires proactive, rigorous analysis of the threats to which it might be exposed, followed by systematic transformation of those threats into security-related requirements. These requirements can then be tracked throughout the development life cycle. The Web extra at https://youtu.be/77FTWWj1clk is an audio podcast of author Jane Cleland-Huang reading her column.
更多
查看译文
关键词
security of data
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要