IEEE/ACM International Conference on Availability, Reliability and Security, ARES 2017


Article Details
Title: Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach
Article URLs:
Alternative Article URLs:
Authors: Sravani Teja Bulusu
  • University Paul Sabatier, IRIT
Romain Laborde
  • University Paul Sabatier, IRIT
Ahmad Samer Wazan
  • University Paul Sabatier, IRIT
François Barrère
  • University Paul Sabatier, IRIT
Abdelmalek Benzekri
  • University Paul Sabatier, IRIT
Sharing: Unknown
Verification: Authors have not verified information
Artifact Evaluation Badge: none
Artifact URLs:
Artifact Correspondence Email Addresses:
NSF Award Numbers:
DBLP Key: conf/IEEEares/BulusuLWBB17
Author Comments:

Discuss this paper and its artifacts below