Fabio Massacci, Federica Paci. How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners. In Audun Jøsang, Bengt Carlsson, editors, Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings. Volume 7617 of Lecture Notes in Computer Science, pages 89-104, Springer, 2012. [doi]
@inproceedings{MassacciP12, title = {How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners}, author = {Fabio Massacci and Federica Paci}, year = {2012}, doi = {10.1007/978-3-642-34210-3_7}, url = {http://dx.doi.org/10.1007/978-3-642-34210-3_7}, researchr = {https://researchr.org/publication/MassacciP12}, cites = {0}, citedby = {0}, pages = {89-104}, booktitle = {Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings}, editor = {Audun Jøsang and Bengt Carlsson}, volume = {7617}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-34209-7}, }