Journal of Software Engineering and Applications
Vol.7 No.8(2014), Paper ID 47628, 13 pages
DOI:10.4236/jsea.2014.78058
Refining Use/Misuse/Mitigation Use Cases for Security Requirements
Joshua J. Pauli
College of Business & Information Systems, Dakota State University, Madison, USA
Copyright © 2014 Joshua J. Pauli et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
How to Cite this Article
Download citation as EndNote
Copyright © 2025 by authors and Scientific Research Publishing Inc.
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.