Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems

Naveed Ikram, Surayya Siddiqui, Naurin Farooq Khan. Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems. In Maya Daneva, Richard Berntsson-Svensson, Xavier Franch, Nazim H. Madhavji, Sabrina Marzcak, editors, 4th IEEE International Workshop on Empirical Requirements Engineering, EmpiRE 2014, Karlskrona, Sweden, August 25, 2014. pages 36-43, IEEE, 2014. [doi]

Authors

Naveed Ikram

This author has not been identified. Look up 'Naveed Ikram' in Google

Surayya Siddiqui

This author has not been identified. Look up 'Surayya Siddiqui' in Google

Naurin Farooq Khan

This author has not been identified. Look up 'Naurin Farooq Khan' in Google