Fernández, E. B., Van Hilst, M., Larrondo Petrie, M. M., & Huang, S. (2006). Defining security requirements through misuse actions.
Cita Chicago Style (17a ed.)Fernández, Eduardo B., Michael Van Hilst, Maria M. Larrondo Petrie, y Shihong Huang. Defining Security Requirements Through Misuse Actions. 2006.
Cita MLA (8a ed.)Fernández, Eduardo B., et al. Defining Security Requirements Through Misuse Actions. 2006.
Precaución: Estas citas no son 100% exactas.