26
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      A serious game for eliciting social engineering security requirements.

      Proceedings of the 24th IEEE International Conference on Requirements Engineering, RE ’16

      Read this article at

      ScienceOpen
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Comments

          Comment on this article