APA (7th ed.) Citation

Hesse, T., & Paech, B. (2014). Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring. IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). https://doi.org/10.1109/ESPRE.2014.6890520

Chicago Style (17th ed.) Citation

Hesse, Tom-Michael, and Barbara Paech. "Semiautomatic Security Requirements Engineering and Evolution Using Decision Documentation, Heuristics, and User Monitoring." IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) 2014. https://doi.org/10.1109/ESPRE.2014.6890520.

MLA (9th ed.) Citation

Hesse, Tom-Michael, and Barbara Paech. "Semiautomatic Security Requirements Engineering and Evolution Using Decision Documentation, Heuristics, and User Monitoring." IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 2014, https://doi.org/10.1109/ESPRE.2014.6890520.

Warning: These citations may not always be 100% accurate.