Empirical research on security and privacy by design: What (not) to expect as a researcher or a reviewer
dc.contributor.author | Yskout, Koen | |
dc.contributor.author | Wuyts, Kim | |
dc.contributor.author | Van Landuyt, Dimitri | |
dc.contributor.author | Scandariato, Ricardo | |
dc.contributor.author | Joosen, Wouter | |
dc.date.accessioned | 2021-10-24T19:41:11Z | |
dc.date.available | 2021-10-24T19:41:11Z | |
dc.date.issued | 2017 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/29995 | |
dc.source | IIOimport | |
dc.title | Empirical research on security and privacy by design: What (not) to expect as a researcher or a reviewer | |
dc.type | Book chapter | |
dc.contributor.imecauthor | Joosen, Wouter | |
dc.source.peerreview | yes | |
dc.source.beginpage | 1 | |
dc.source.book | Empirical Research for Software Security: Foundations and Experience | |
dc.source.endpage | 46 | |
dc.identifier.url | https://doi.org/10.1201/9781315154855 | |
imec.availability | Published - imec | |
imec.internalnotes | Chapter 1 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |