Analysing Requirements to Detect Latent Security Vulnerabilities | IEEE Conference Publication | IEEE Xplore