BibTeX record conf/acsac/McDermottF99

download as .bib file

@inproceedings{DBLP:conf/acsac/McDermottF99,
  author       = {John P. McDermott and
                  Chris Fox},
  title        = {Using Abuse Case Models for Security Requirements Analysis},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {55--64},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816013},
  doi          = {10.1109/CSAC.1999.816013},
  timestamp    = {Thu, 23 Mar 2023 23:57:47 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermottF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics