This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
erise_2012 [2013/04/08 17:59] katsiaryna.labunets@unitn.it [Participants] |
erise_2012 [2013/04/08 17:59] katsiaryna.labunets@unitn.it [Evaluated Methods] |
||
---|---|---|---|
Line 27: | Line 27: | ||
==== Evaluated Methods ==== | ==== Evaluated Methods ==== | ||
- | {{ :research_activities:erise:erise_2012:photo:training.jpeg?200|}} | + | {{ :research_activities:erise:erise_2012:photo:training.jpeg?250|}} |
The selection of the security requirements methods to be evaluated was driven | The selection of the security requirements methods to be evaluated was driven | ||
by three main factors: the number of citations, the fact that research on the | by three main factors: the number of citations, the fact that research on the |