共 50 条
- [32] A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems COMPANION OF THE 2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS-C 2020), 2020, : 426 - 433
- [33] CyberRank-Knowledge Elicitation for Risk Assessment of Database Security CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, : 2009 - 2012
- [35] System evolution through semi-automatic elicitation of security requirements: A Position Paper IFAC PAPERSONLINE, 2018, 51 (10): : 64 - 69
- [36] New trends and requirements for dynamic security assessment CONTROL OF POWER SYSTEMS AND POWER PLANTS 1997 (CPSPP'97), 1998, : 557 - 562
- [37] Assessment of Risk Perception in Security Requirements Composition 2015 IEEE 23RD INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2015, : 146 - 155
- [39] An Assessment of Security Requirements Compliance of Cloud Providers 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
- [40] Managing Ethical Requirements Elicitation SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT, EUROSPI 2023, PT I, 2023, 1890 : 258 - 272