共 22 条
[1]
Identification of Security Requirements from the Selected Set of Requirements under Fuzzy Environment
[J].
2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS),
2021,
:58-63
[2]
Aldawood H, 2018, PR IEEE INT CONF TEA, P62, DOI 10.1109/TALE.2018.8615162
[3]
Carella A, 2017, IEEE INT CONF BIG DA, P4458, DOI 10.1109/BigData.2017.8258485
[4]
da Silva M. A., 2015, IMPORTANCE SECURITY
[5]
Dodson D., 2019, MITIGATING RISK SOFT
[7]
Eyadat M. S., 2018, ASIAN J COMPUT INF S, V6
[8]
Filippidis Adam P., 2018, 2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST), DOI 10.1109/MOCAST.2018.8376578
[9]
When Software Engineering meets Cybersecurity at the classroom
[J].
2019 7TH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION (CONISOFT 2019),
2019,
:49-54