Lectures
- Introductory Lecture 1 (13.February):
- Introductory Lecture 2 (20.February):
- Slides
- Procedures for performing systematic reviews
- Example 1: Levasseur O., Iqbal M., Matulevičius R.: Survey of Model-Driven Engineering Techniques for Blockchain-Based Applications. Proceedings of the Forum at Practice of Enterprise Modeling 2021 (PoEM-Forum 2021)
- Example 2: Ganji D., Kalloniatis C., Mouratidis H., Gheytassi S. M. (2019): Approaches to Develop and Implement ISO/IEC 27001 Standard - Information Security Management Systems: A Systematic Literature Review, International Journal on Advances in Software, vol 12, No 3&4, 2019
- Example 3: Mellado, D., Blanco, C., Sánchez, L.E., Fernández-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interf. 32, 153–165 (2010)
- Introductory Lecture 3 (27.February):
- Slides, Exercise