z-logo
open-access-imgOpen Access
Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle
Author(s) -
Dal-Mi Seo,
Ki-Jong Cha,
Yo-Soon Shin,
Choong-Heui Jeong,
Young-Mi Kim
Publication year - 2015
Publication title -
journal of the korea institute of information security and cryptology
Language(s) - English
Resource type - Journals
eISSN - 2288-2715
pISSN - 1598-3986
DOI - 10.13089/jkiisc.2015.25.2.363
Subject(s) - computer security , software security assurance , computer science , security controls , software , information security , security information and event management , nuclear power , risk analysis (engineering) , reliability (semiconductor) , control (management) , security service , cloud computing security , business , power (physics) , cloud computing , physics , quantum mechanics , artificial intelligence , programming language , operating system , ecology , biology

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom