How to Select a Security Requirements Method? A comparative study with students and practitioners.
Research Area: | Uncategorized | Year: | 2012 |
---|---|---|---|
Type of Publication: | In Proceedings | ||
Authors: |
|
||
Book title: | Proceedings of 17th Nordic Conference on Secure IT Systems, NORDSEC 2012 | ||
BibTex: |
|||
Note: | partner: UNITN; PROJECT: NESSoS; TIER C; citation:2 |
||
[Bibtex] |