MLA
Nhlabatsi, Armstrong,et al. "Security Patterns: Comparing Modeling Approaches." Software Engineering for Secure Systems: Industrial and Research Perspectives, edited by H. Mouratidis, IGI Global, 2011, pp. 75-111. http://doi:10.4018/978-1-61520-837-1.ch004
APA
Nhlabatsi, A., Bandara, A., Hayashi, S., Haley, C., Jurjens, J., Kaiya, H., Kubo, A., Laney, R., Mouratidis, H., Nuseibeh, B., Tun, T., Washizaki, H., Yoshioka, N., & Yu, Y. (2011). Security Patterns: Comparing Modeling Approaches. In Mouratidis, H. (Ed.), Software Engineering for Secure Systems: Industrial and Research Perspectives (pp. 75-111). IGI Global. http://doi:10.4018/978-1-61520-837-1.ch004
Chicago
Nhlabatsi, Armstrong and Arosha Bandara, Shinpei Hayashi, Charles Haley, Jan Jurjens, Haruhiko Kaiya, Atsuto Kubo, Robin Laney, Haralambos Mouratidis, Bashar Nuseibeh, Thein Tun, Hironori Washizaki, Nobukazu Yoshioka, and Yijun Yu. "Security Patterns: Comparing Modeling Approaches." In Software Engineering for Secure Systems: Industrial and Research Perspectives. edited by H. Mouratidis, 75-111. Hershey, PA: IGI Global, 2011. http://doi:10.4018/978-1-61520-837-1.ch004
Export Reference
