User Tools

Site Tools


validation_of_risk_and_security_requirements_methodologies

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
validation_of_risk_and_security_requirements_methodologies [2017/02/28 18:32]
katsiaryna.labunets@unitn.it [Experiments]
validation_of_risk_and_security_requirements_methodologies [2021/01/29 10:58] (current)
Line 66: Line 66:
       * [[unitn-comprehensibility-exp-2015|Sep 16th, 2015]] in Cosenza, Italy at Poste Italiane cyber-security lab (52 participants),​       * [[unitn-comprehensibility-exp-2015|Sep 16th, 2015]] in Cosenza, Italy at Poste Italiane cyber-security lab (52 participants),​
       * [[unitn-comprehensibility-exp-2015|Sep 21st, 2015]] in University of Trento, Italy (51 participants),​       * [[unitn-comprehensibility-exp-2015|Sep 21st, 2015]] in University of Trento, Italy (51 participants),​
-      * Jan-Feb, ​ 2016 an online comprehensibility experiment with IT professionals (58 participants),​ +      * [[sid-2015-tutorial|Dec 2nd, 2015]] in Bologna, Italy with ATM professionals (15 participants),​ 
-      * Sep 21st, 2016 in University of Trento, Italy (35 participants),​+      * [[online-comprehensibility-exp-2016|Jan-Feb, ​ 2016]] an online comprehensibility experiment with IT professionals (58 participants),​ 
 +      * Sep 21st, 2016 in University of Trento, Italy (35 participants)
 +  - Empirical Evaluation of CVSS Environmental Metrics. 
 +      * [[unitn_cvss_env_exp_2016|Nov 2016]] in University of TrentoItaly (29 participants).
  
  
validation_of_risk_and_security_requirements_methodologies.1488306775.txt.gz · Last modified: 2021/01/29 10:58 (external edit)