eRISE Challenge 2012 Print

How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners. Preliminary Results of eRISE challenge.
http://link.springer.com/chapter/10.1007%2F978-3-642-34210-3_7

A short video is also available on the eRISE 2012 challenge.

http://www.nessos-project.eu/index.php?view=weblink&catid=2%3Arelated-links&id=15%3Aerise-challenge-2012&option=com_weblinks&Itemid=48