Maher, Z. A., Shah, A., Shaikh, H., Rahu, G. A., Butt, P. K., Chandio, S., & Shaikh, S. (2018). A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases. IEEE Explore.
Chicago Style (17th ed.) CitationMaher, Zulfikar Ahmad, Asadullah Shah, Humaiz Shaikh, Ghulam Ali Rahu, Pinial Khan Butt, Shahmurad Chandio, and Saima Shaikh. A Methodology for Modelling and Analysis of Secure Systems Using Security Patterns and Mitigation Use Cases. IEEE Explore, 2018.
MLA (8th ed.) CitationMaher, Zulfikar Ahmad, et al. A Methodology for Modelling and Analysis of Secure Systems Using Security Patterns and Mitigation Use Cases. IEEE Explore, 2018.
Warning: These citations may not always be 100% accurate.