시큐어 소프트웨어 개발을 위한 위협 모델링 기법의 기술 동향

The Korea Institute of Information Security and Cryptology, Vol. 25, No. 1, pp. 32-38, 2월. 2015
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. Lee, H. Lee, I. Kang, "nan," The Korea Institute of Information Security and Cryptology, vol. 25, no. 1, pp. 32-38, 2015.

[ACM Style]
Jeanho Lee, Hyuk Lee, and Inhye Kang. 2015. nan. The Korea Institute of Information Security and Cryptology, 25, 1, (2015), 32-38.