Send mail to Author

A Model for Structuring and Reusing Security Requirements Sources (Doctoral Thesis)

Please indicate your contact information and select, which author you want to contact.



 
 __   _    __   __   __   __    _____     ______     ___    
| || | ||  \ \\/ //  \ \\/ //  |  ___||  /_   _//   / _ \\  
| '--' ||   \ ` //    \   //   | ||__    `-| |,-   | / \ || 
| .--. ||    | ||     / . \\   | ||__      | ||    | \_/ || 
|_|| |_||    |_||    /_//\_\\  |_____||    |_||     \___//  
`-`  `-`     `-`'    `-`  --`  `-----`     `-`'     `---`   
                                                            
 


Back to frontdoor view