sid-2015-tutorial
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
sid-2015-tutorial [2015/09/17 19:09] – [Please forward the invitation to any of your colleagues who could be interested in attending the tutorial!] fabio.massacci@unitn.it | sid-2015-tutorial [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== EMFASE Security Risk Assessment Tutorial and Exercise ====== | ====== EMFASE Security Risk Assessment Tutorial and Exercise ====== | ||
- | **//The EMFASE Consortium is glad to invite you to the EMFASE Security Risk Assessment Tutorial and Hands-On Exercise to be held {{http:// | + | {{: |
+ | |||
+ | |||
+ | **//The EMFASE Consortium is glad to invite you to the EMFASE Security Risk Assessment Tutorial and Hands-On Exercise to be held on the {{http:// | ||
Line 7: | Line 10: | ||
The empirical framework will include an integrated process and detailed guidelines for how to select the risk assessment method best suited for a particular situation, e.g., concept under assessment and its maturity level, involved stakeholders, | The empirical framework will include an integrated process and detailed guidelines for how to select the risk assessment method best suited for a particular situation, e.g., concept under assessment and its maturity level, involved stakeholders, | ||
- | In order to develop the empirical evaluation framework and draw the guidelines, EMFASE classifies, evaluates and compares different Risk Assessment methods in terms of performance, | + | In order to develop the empirical evaluation framework and draw the guidelines, EMFASE classifies, evaluates and compares different Risk Assessment methods in terms of performance, |
+ | |||
+ | Read some of our past studies | ||
+ | * Our framework for Security | ||
+ | * An experiment | ||
+ | * An experiment on the effectiveness of Security Catalogues for Novices. Published at EmpiRE 2015. {{: | ||
+ | * An experiment on the effectiveness of Security Risk Assessment Methods. Published at EmpiRE 2014. {{: | ||
===== Focus of the tutorial ===== | ===== Focus of the tutorial ===== |
sid-2015-tutorial.1442509783.txt.gz · Last modified: 2021/01/29 10:58 (external edit)