共 50 条
- [1] Knowledge-Based Support for Software Engineering ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, 2010, 339 : 219 - 229
- [2] A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development BMC Medical Informatics and Decision Making, 20
- [4] Threat Analysis for Hardware and Software Products using HazOp PROCEEDINGS OF THE 15TH AMERICAN CONFERENCE ON APPLIED MATHEMATICS AND PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES 2009, VOLS I AND II, 2009, : 446 - +
- [5] Trustworthy Software Development Based on Model Driven Architecture INFORMATION COMPUTING AND APPLICATIONS, ICICA 2013, PT I, 2013, 391 : 193 - +
- [6] Trustworthy Software Development COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 : 233 - 247
- [7] Threat Extraction Method Based on UML Software Description 2018 15TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2018,
- [8] Measure Model of Trustworthy Software Based on Axiomatic Design 2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
- [10] Formal analysis to non-functional requirements of trustworthy software Ruan Jian Xue Bao/Journal of Software, 2015, 26 (10): : 2545 - 2566