共 50 条
- [1] An Ontology Based Collaborative Recommender System for Security Requirements Elicitation 2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 448 - 453
- [2] An Extended Ontology for Security Requirements ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, 2011, 83 : 622 - +
- [3] Security Requirements Elicitation and Modeling Authorizations SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250
- [4] Security Requirements Elicitation and Assessment Mechanism (SecREAM) 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1862 - 1866
- [5] Security Requirements Elicitation from Business Processes BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202
- [6] Requirements Elicitation and Derivation of Security Policy Templates 2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 283 - 292
- [7] Security requirements elicitation: a smart health case PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 776 - 781
- [8] Existing Vulnerability Information in Security Requirements Elicitation 2022 IEEE 30TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2022, : 220 - 225
- [9] Security requirements elicitation via weaving scenarios based on security evaluation criteria USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 70 - 79