共 50 条
- [21] Identifying Security Requirements Body of Knowledge for the Security Systems Engineer INFORMATION SECURITY EDUCATION: EDUCATION IN PROACTIVE INFORMATION SECURITY, WISE 12, 2019, 557 : 59 - 71
- [22] A Study of Security Requirements Negotiation 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 51 - 56
- [23] Security Requirements for Smart Toys ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2017, : 144 - 154
- [25] System Engineering Security KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT II, PROCEEDINGS, 2009, 5712 : 821 - 828
- [27] Relating Security Requirements and Design Patterns Reducing Security Requirements implementation impacts with Design Patterns 2009 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ADVANCES (ICSEA 2009), 2009, : 9 - 14
- [29] Maintenance & Information Security Ontology 2017 4TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2017, : 312 - 317
- [30] Terahertz detection of substances for security related purposes SMART STRUCTURES, DEVICES, AND SYSTEMS III, 2007, 6414