Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer. Williams, L. A., Gegick, M., & Meneely, A. In Massacci, F., Jr., S. T. R., & Zannone, N., editors, ESSoS, volume 5429, of Lecture Notes in Computer Science, pages 122-134, 2009. Springer.
Link
Paper bibtex @inproceedings{conf/essos/WilliamsGM09,
added-at = {2020-09-07T00:00:00.000+0200},
author = {Williams, Laurie A. and Gegick, Michael and Meneely, Andrew},
biburl = {https://www.bibsonomy.org/bibtex/2f63b3f5b9520323349a9ecd04d582bd1/dblp},
booktitle = {ESSoS},
crossref = {conf/essos/2009},
editor = {Massacci, Fabio and Jr., Samuel T. Redwine and Zannone, Nicola},
ee = {https://doi.org/10.1007/978-3-642-00199-4_11},
interhash = {4a6cde9c5c4f60ea768dfd3dd2621a93},
intrahash = {f63b3f5b9520323349a9ecd04d582bd1},
isbn = {978-3-642-00198-7},
keywords = {dblp},
pages = {122-134},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2020-09-09T14:46:34.000+0200},
title = {Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer.},
url = {http://dblp.uni-trier.de/db/conf/essos/essos2009.html#WilliamsGM09},
volume = 5429,
year = 2009
}
Downloads: 0
{"_id":"JF4enuYm6C2bDK79J","bibbaseid":"williams-gegick-meneely-protectionpokerstructuringsoftwaresecurityriskassessmentandknowledgetransfer-2009","author_short":["Williams, L. A.","Gegick, M.","Meneely, A."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2020-09-07T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Williams"],"firstnames":["Laurie","A."],"suffixes":[]},{"propositions":[],"lastnames":["Gegick"],"firstnames":["Michael"],"suffixes":[]},{"propositions":[],"lastnames":["Meneely"],"firstnames":["Andrew"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2f63b3f5b9520323349a9ecd04d582bd1/dblp","booktitle":"ESSoS","crossref":"conf/essos/2009","editor":[{"propositions":[],"lastnames":["Massacci"],"firstnames":["Fabio"],"suffixes":[]},{"propositions":[],"lastnames":["Jr."],"firstnames":["Samuel","T.","Redwine"],"suffixes":[]},{"propositions":[],"lastnames":["Zannone"],"firstnames":["Nicola"],"suffixes":[]}],"ee":"https://doi.org/10.1007/978-3-642-00199-4_11","interhash":"4a6cde9c5c4f60ea768dfd3dd2621a93","intrahash":"f63b3f5b9520323349a9ecd04d582bd1","isbn":"978-3-642-00198-7","keywords":"dblp","pages":"122-134","publisher":"Springer","series":"Lecture Notes in Computer Science","timestamp":"2020-09-09T14:46:34.000+0200","title":"Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer.","url":"http://dblp.uni-trier.de/db/conf/essos/essos2009.html#WilliamsGM09","volume":"5429","year":"2009","bibtex":"@inproceedings{conf/essos/WilliamsGM09,\n added-at = {2020-09-07T00:00:00.000+0200},\n author = {Williams, Laurie A. and Gegick, Michael and Meneely, Andrew},\n biburl = {https://www.bibsonomy.org/bibtex/2f63b3f5b9520323349a9ecd04d582bd1/dblp},\n booktitle = {ESSoS},\n crossref = {conf/essos/2009},\n editor = {Massacci, Fabio and Jr., Samuel T. Redwine and Zannone, Nicola},\n ee = {https://doi.org/10.1007/978-3-642-00199-4_11},\n interhash = {4a6cde9c5c4f60ea768dfd3dd2621a93},\n intrahash = {f63b3f5b9520323349a9ecd04d582bd1},\n isbn = {978-3-642-00198-7},\n keywords = {dblp},\n pages = {122-134},\n publisher = {Springer},\n series = {Lecture Notes in Computer Science},\n timestamp = {2020-09-09T14:46:34.000+0200},\n title = {Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer.},\n url = {http://dblp.uni-trier.de/db/conf/essos/essos2009.html#WilliamsGM09},\n volume = 5429,\n year = 2009\n}\n\n","author_short":["Williams, L. A.","Gegick, M.","Meneely, A."],"editor_short":["Massacci, F.","Jr., S. T. R.","Zannone, N."],"key":"conf/essos/WilliamsGM09","id":"conf/essos/WilliamsGM09","bibbaseid":"williams-gegick-meneely-protectionpokerstructuringsoftwaresecurityriskassessmentandknowledgetransfer-2009","role":"author","urls":{"Link":"https://doi.org/10.1007/978-3-642-00199-4_11","Paper":"http://dblp.uni-trier.de/db/conf/essos/essos2009.html#WilliamsGM09"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/williams?items=1000","dataSources":["9yEa5Kjt9P75Q7HKD"],"keywords":["dblp"],"search_terms":["protection","poker","structuring","software","security","risk","assessment","knowledge","transfer","williams","gegick","meneely"],"title":"Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer.","year":2009}