@article{article, title = {{Stressing Security Requirements: exploiting the Flaw Hypothesis Method with Deviational Techniques}}, url = {{}}, year = {{2005}}, month = {{1}}, author = {{Srivratanakul T and Clark JA and Polack FAC}}, journal = {{Symposium on Requirements Engineering for Information Security (SREIS 2005)}}, note = {{Accessed on 2024/12/22}}}