Cited By
View all- Subha RHaldorai A(2022)An Efficient Identification of Security Threats in Requirement Engineering MethodologyComputational Intelligence and Neuroscience10.1155/2022/18720792022(1-14)Online publication date: 18-Aug-2022
- Ansari MBaz AAlhakami HAlhakami WKumar RKhan R(2021)P-STORE: Extension of STORE Methodology to Elicit Privacy RequirementsArabian Journal for Science and Engineering10.1007/s13369-021-05476-z46:9(8287-8310)Online publication date: 7-Mar-2021
- van Zee MBex FGhanavati S(2020)RationalGRL: A framework for argumentation and goal modelingArgument & Computation10.3233/AAC-200527(1-55)Online publication date: 25-Nov-2020
- Show More Cited By