Home Publications

How to Select a Security Requirements Method? A comparative study with students and practitioners.

Research Area: Uncategorized Year: 2012
Type of Publication: In Proceedings
Authors:
  • Massacci, F.
  • Paci, Federica
Book title: Proceedings of 17th Nordic Conference on Secure IT Systems, NORDSEC 2012
BibTex:
Note:
partner: UNITN; PROJECT: NESSoS; TIER C; citation:2
[Bibtex]