Cited By
View all- Stach CMitschang B(2019)Elicitation of Privacy Requirements for the Internet of Things Using ACCESSORSInformation Systems Security and Privacy10.1007/978-3-030-25109-3_3(40-65)Online publication date: 5-Jul-2019
- Schreckling DKöStler JSchaff M(2018)KynoidInformation Security Tech. Report10.1016/j.istr.2012.10.00617:3(71-80)Online publication date: 15-Dec-2018
- Sadeghi ABagheri HGarcia JMalek S(2017)A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android SoftwareIEEE Transactions on Software Engineering10.1109/TSE.2016.261530743:6(492-530)Online publication date: 1-Jun-2017
- Show More Cited By