Introducing abuse frames for analysing security requirements | IEEE Conference Publication | IEEE Xplore