Copy reference, caption or embed code

Figure 5 - Reusable knowledge in security requirements engineering: a systematic mapping study

Figure 5. A standard modification abuse frame taken from [67] 
A standard modification abuse frame taken from [67] 
Go to figure page
Reference
Caption
Embed code