Search Results - "Privacy requirements engineering"

  • Showing 1 - 11 results of 11
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Source: Diamantopoulou, V, Pavlidis, M & Mouratidis, H 2017, Evaluation of a security and privacy requirements methodology using the physics of notation. in J Mylopoulos, C Lambrinoudakis, C Kalloniatis, F Cuppens, N Cuppens, A Anton, S K Katsikas & S Gritzalis (eds), Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10683 LNCS, Springer-Verlag, Oslo, Norway, pp. 210-225, 3rd Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2017, 1st International Workshop on Security ....

    File Description: application/pdf

    Relation: info:eu-repo/semantics/altIdentifier/isbn/9783319728162; urn:ISBN:9783319728162

  10. 10
  11. 11