Network security requirements engineering methodology. Bulusu, S. T. Ph.D. Thesis, HAL CCSD, 2019. Paper bibtex @phdthesis{bulusu_network_2019,
type = {{PhD} {Thesis}},
title = {Network security requirements engineering methodology},
url = {https://tel.archives-ouvertes.fr/tel-02896486},
language = {fr},
school = {HAL CCSD},
author = {Bulusu, Sravani Teja},
year = {2019},
keywords = {[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]},
}
Downloads: 0
{"_id":"nFh84TXnqYnQCSw75","bibbaseid":"bulusu-networksecurityrequirementsengineeringmethodology-2019","author_short":["Bulusu, S. T."],"bibdata":{"bibtype":"phdthesis","type":"PhD Thesis","title":"Network security requirements engineering methodology","url":"https://tel.archives-ouvertes.fr/tel-02896486","language":"fr","school":"HAL CCSD","author":[{"propositions":[],"lastnames":["Bulusu"],"firstnames":["Sravani","Teja"],"suffixes":[]}],"year":"2019","keywords":"[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]","bibtex":"@phdthesis{bulusu_network_2019,\n\ttype = {{PhD} {Thesis}},\n\ttitle = {Network security requirements engineering methodology},\n\turl = {https://tel.archives-ouvertes.fr/tel-02896486},\n\tlanguage = {fr},\n\tschool = {HAL CCSD},\n\tauthor = {Bulusu, Sravani Teja},\n\tyear = {2019},\n\tkeywords = {[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]},\n}\n\n","author_short":["Bulusu, S. T."],"key":"bulusu_network_2019","id":"bulusu_network_2019","bibbaseid":"bulusu-networksecurityrequirementsengineeringmethodology-2019","role":"author","urls":{"Paper":"https://tel.archives-ouvertes.fr/tel-02896486"},"keyword":["[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"phdthesis","biburl":"https://bibbase.org/zotero/SilverSylvester","dataSources":["YCBcQPneB9oxahSnp"],"keywords":["[info.info-se]computer science [cs]/software engineering [cs.se]"],"search_terms":["network","security","requirements","engineering","methodology","bulusu"],"title":"Network security requirements engineering methodology","year":2019}