@article{article, title = {{Stressing Security Requirements: exploiting the Flaw Hypothesis Method with Deviational Techniques}},
url = {{}},
year = {{2005}},
month = {{1}},
author = {{Srivratanakul T and Clark JA and Polack FAC}},
journal = {{Symposium on Requirements Engineering for Information Security (SREIS 2005)}},
note = {{Accessed on 2025/05/21}}}