No abstract is available for this paper.
How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners
Published 2012 in Nordic Conference on Secure IT Systems
ABSTRACT
PUBLICATION RECORD
- Publication year
2012
- Venue
Nordic Conference on Secure IT Systems
- Publication date
2012-10-31
- Fields of study
Computer Science
- Identifiers
- External record
- Source metadata
Semantic Scholar
CITATION MAP
EXTRACTION MAP
CLAIMS
- No claims are published for this paper.
CONCEPTS
- No concepts are published for this paper.
REFERENCES
Showing 1-20 of 20 references · Page 1 of 1
CITED BY
Showing 1-30 of 30 citing papers · Page 1 of 1