How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners

Fabio Massacci, Federica Paci. How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners. In Audun Jøsang, Bengt Carlsson, editors, Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings. Volume 7617 of Lecture Notes in Computer Science, pages 89-104, Springer, 2012. [doi]

@inproceedings{MassacciP12,
  title = {How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners},
  author = {Fabio Massacci and Federica Paci},
  year = {2012},
  doi = {10.1007/978-3-642-34210-3_7},
  url = {http://dx.doi.org/10.1007/978-3-642-34210-3_7},
  researchr = {https://researchr.org/publication/MassacciP12},
  cites = {0},
  citedby = {0},
  pages = {89-104},
  booktitle = {Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings},
  editor = {Audun Jøsang and Bengt Carlsson},
  volume = {7617},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-34209-7},
}