Identifying the implied: Findings from three differentiated replications on the use of security requirements templates. Riaz, M., King, J. T., Slankas, J., Williams, L. A., Massacci, F., Quesada-López, C., & Jenkins, M. Empir. Softw. Eng., 22(4):2127-2178, 2017.
Link
Paper bibtex @article{journals/ese/RiazKSWMQJ17,
added-at = {2020-10-26T00:00:00.000+0100},
author = {Riaz, Maria and King, Jason Tyler and Slankas, John and Williams, Laurie A. and Massacci, Fabio and Quesada-López, Christian and Jenkins, Marcelo},
biburl = {https://www.bibsonomy.org/bibtex/22d38d96bc378a37f30ec0b466f3f1c00/dblp},
ee = {https://www.wikidata.org/entity/Q57425274},
interhash = {8816877cd77ad8a87562ddc2ba19f3d1},
intrahash = {2d38d96bc378a37f30ec0b466f3f1c00},
journal = {Empir. Softw. Eng.},
keywords = {dblp},
number = 4,
pages = {2127-2178},
timestamp = {2020-10-27T11:47:36.000+0100},
title = {Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.},
url = {http://dblp.uni-trier.de/db/journals/ese/ese22.html#RiazKSWMQJ17},
volume = 22,
year = 2017
}
Downloads: 0
{"_id":"CcT797PNznoReSdtK","bibbaseid":"riaz-king-slankas-williams-massacci-quesadalpez-jenkins-identifyingtheimpliedfindingsfromthreedifferentiatedreplicationsontheuseofsecurityrequirementstemplates-2017","author_short":["Riaz, M.","King, J. T.","Slankas, J.","Williams, L. A.","Massacci, F.","Quesada-López, C.","Jenkins, M."],"bibdata":{"bibtype":"article","type":"article","added-at":"2020-10-26T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Riaz"],"firstnames":["Maria"],"suffixes":[]},{"propositions":[],"lastnames":["King"],"firstnames":["Jason","Tyler"],"suffixes":[]},{"propositions":[],"lastnames":["Slankas"],"firstnames":["John"],"suffixes":[]},{"propositions":[],"lastnames":["Williams"],"firstnames":["Laurie","A."],"suffixes":[]},{"propositions":[],"lastnames":["Massacci"],"firstnames":["Fabio"],"suffixes":[]},{"propositions":[],"lastnames":["Quesada-López"],"firstnames":["Christian"],"suffixes":[]},{"propositions":[],"lastnames":["Jenkins"],"firstnames":["Marcelo"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/22d38d96bc378a37f30ec0b466f3f1c00/dblp","ee":"https://www.wikidata.org/entity/Q57425274","interhash":"8816877cd77ad8a87562ddc2ba19f3d1","intrahash":"2d38d96bc378a37f30ec0b466f3f1c00","journal":"Empir. Softw. Eng.","keywords":"dblp","number":"4","pages":"2127-2178","timestamp":"2020-10-27T11:47:36.000+0100","title":"Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.","url":"http://dblp.uni-trier.de/db/journals/ese/ese22.html#RiazKSWMQJ17","volume":"22","year":"2017","bibtex":"@article{journals/ese/RiazKSWMQJ17,\n added-at = {2020-10-26T00:00:00.000+0100},\n author = {Riaz, Maria and King, Jason Tyler and Slankas, John and Williams, Laurie A. and Massacci, Fabio and Quesada-López, Christian and Jenkins, Marcelo},\n biburl = {https://www.bibsonomy.org/bibtex/22d38d96bc378a37f30ec0b466f3f1c00/dblp},\n ee = {https://www.wikidata.org/entity/Q57425274},\n interhash = {8816877cd77ad8a87562ddc2ba19f3d1},\n intrahash = {2d38d96bc378a37f30ec0b466f3f1c00},\n journal = {Empir. Softw. Eng.},\n keywords = {dblp},\n number = 4,\n pages = {2127-2178},\n timestamp = {2020-10-27T11:47:36.000+0100},\n title = {Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.},\n url = {http://dblp.uni-trier.de/db/journals/ese/ese22.html#RiazKSWMQJ17},\n volume = 22,\n year = 2017\n}\n\n","author_short":["Riaz, M.","King, J. T.","Slankas, J.","Williams, L. A.","Massacci, F.","Quesada-López, C.","Jenkins, M."],"key":"journals/ese/RiazKSWMQJ17","id":"journals/ese/RiazKSWMQJ17","bibbaseid":"riaz-king-slankas-williams-massacci-quesadalpez-jenkins-identifyingtheimpliedfindingsfromthreedifferentiatedreplicationsontheuseofsecurityrequirementstemplates-2017","role":"author","urls":{"Link":"https://www.wikidata.org/entity/Q57425274","Paper":"http://dblp.uni-trier.de/db/journals/ese/ese22.html#RiazKSWMQJ17"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/williams?items=1000","dataSources":["9yEa5Kjt9P75Q7HKD"],"keywords":["dblp"],"search_terms":["identifying","implied","findings","three","differentiated","replications","use","security","requirements","templates","riaz","king","slankas","williams","massacci","quesada-lópez","jenkins"],"title":"Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.","year":2017}