共 50 条
- [31] Using Security and Domain ontologies for Security Requirements Analysis 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 101 - 107
- [32] Methodology for security risk assessments-is there a best practice? RISK, RELIABILITY AND SAFETY: INNOVATING THEORY AND PRACTICE, 2017, : 860 - 866
- [33] Assessment of Risk Perception in Security Requirements Composition 2015 IEEE 23RD INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2015, : 146 - 155
- [34] Assessing Security Risk and Requirements for Systems of Systems 2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 454 - 459
- [38] AN EVALUATION OF SECURITY REQUIREMENTS BASED ON THE CAPABILITY MODEL IEICE TRANSACTIONS ON COMMUNICATIONS ELECTRONICS INFORMATION AND SYSTEMS, 1991, 74 (08): : 2160 - 2165
- [39] Security Evaluation of Authentication Requirements in IoT Gateways Journal of Network and Systems Management, 2023, 31
- [40] Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems Reliability Engineering and System Safety, 2022, 220