BibTeX record conf/icics/JensenTM10

download as .bib file

@inproceedings{DBLP:conf/icics/JensenTM10,
  author       = {Jostein Jensen and
                  Inger Anne T{\o}ndel and
                  Per H{\aa}kon Meland},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Experimental Threat Model Reuse with Misuse Case Diagrams},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {355--366},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_25},
  doi          = {10.1007/978-3-642-17650-0\_25},
  timestamp    = {Thu, 31 Oct 2019 17:50:29 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/JensenTM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics