User Tools

Site Tools


erise_2012

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision Both sides next revision
erise_2012 [2013/04/08 17:59]
katsiaryna.labunets@unitn.it [Participants]
erise_2012 [2013/04/08 17:59]
katsiaryna.labunets@unitn.it [Evaluated Methods]
Line 27: Line 27:
 ==== Evaluated Methods ==== ==== Evaluated Methods ====
  
-{{ :​research_activities:​erise:​erise_2012:​photo:​training.jpeg?​200|}}+{{ :​research_activities:​erise:​erise_2012:​photo:​training.jpeg?​250|}}
 The selection of the security requirements methods to be evaluated was driven The selection of the security requirements methods to be evaluated was driven
 by three main factors: the number of citations, the fact that research on the by three main factors: the number of citations, the fact that research on the
erise_2012.txt ยท Last modified: 2021/01/29 10:58 (external edit)