Entry Massacci:2012:HSS from lncs2012k.bib
Last update: Sun Mar 31 02:50:04 MDT 2019
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Massacci:2012:HSS,
author = "Fabio Massacci and Federica Paci",
title = "How to Select a Security Requirements Method? {A}
Comparative Study with Students and Practitioners",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7617",
pages = "89--104",
year = "2012",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-34210-3_7",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Wed Dec 19 15:25:55 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-34210-3_7/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-34210-3",
book-URL = "http://www.springerlink.com/content/978-3-642-34210-3",
fjournal = "Lecture Notes in Computer Science",
}
Related entries
- Comparative,
7601(0)78
- How,
7621(0)26,
7621(0)98,
7621(0)138
- Method,
7601(0)1,
7602(0)31,
7610(0)126,
7610(0)187,
7610(0)204,
7612(0)13,
7612(0)37,
7614(0)28,
7621(0)138,
7623(0)164,
7628(0)28,
7632(0)1,
7635(0)1,
7635(0)2,
7635(0)282,
7636(0)191,
7637(0)41,
7645(0)86
- Requirement,
7612(0)74,
7612(0)161,
7613(0)117,
7623(0)217,
7623(0)283,
7636(0)283
- Security,
7612(0)25,
7612(0)137,
7612(0)246,
7613(0)209,
7613(0)234,
7617(0)17,
7617(0)47,
7617(0)61,
7617(0)73,
7618(0)202,
7618(0)239,
7622(0)41,
7622(0)55,
7622(0)161,
7622(0)172,
7622(0)188,
7631(0)216,
7631(0)260,
7638(0)186,
7638(0)234,
7638(0)248,
7638(0)264,
7638(0)281,
7638(0)308,
7645(0)72,
7645(0)100,
7645(0)263,
7645(0)276
- Students,
7634(0)136
- Study,
7608(0)54,
7610(0)204,
7621(0)35,
7621(0)76,
7625(0)53,
7634(0)67,
7634(0)144,
7637(0)111