How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners

F. Massacci,F. Paci

Published 2012 in Nordic Conference on Secure IT Systems

ABSTRACT

No abstract is available for this paper.

PUBLICATION RECORD

CITATION MAP

EXTRACTION MAP

CLAIMS

  • No claims are published for this paper.

CONCEPTS

  • No concepts are published for this paper.

REFERENCES

Showing 1-20 of 20 references · Page 1 of 1

CITED BY

Showing 1-30 of 30 citing papers · Page 1 of 1