共 50 条
- [31] Security in operational wireless sensor networks 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 781 - +
- [32] Operational Support for Critical Infrastructure Security 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1473 - 1478
- [33] IoT Security Attacks Using Reverse Engineering Methods On WSN Applications 2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 182 - 187
- [34] Balancing Security Requirements and Emotional Requirements in Video Games PROCEEDINGS OF THE 16TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, 2008, : 319 - 320
- [36] Security-Based Circuit Breaker Maintenance Management 2013 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PES), 2013,
- [37] Security Requirements for Proctoring in Higher Education 2024 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE, EDUCON 2024, 2024,
- [38] Quantum Cryptography - The Analysis of Security Requirements ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 814 - 817
- [39] Security requirements in software product lines SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 442 - +
- [40] Eliciting security requirements by misuse cases 37TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 120 - 143