共 50 条
- [31] Applying a security requirements engineering process [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206
- [32] Story based Mobile Application for Requirements Engineering Process [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 303 - 307
- [33] Research on Security Requirements Engineering Process [J]. 2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 1285 - 1288
- [34] A Framework for Security Design Engineering Process [J]. COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 287 - +
- [35] Guiding the application of design patterns based on UML models [J]. ICSM 2006: 22ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2006, : 234 - +
- [36] A process framework for characterising security properties of component-based software systems [J]. 2004 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2004, : 358 - 367
- [37] Framework for Engineering Complex Security Requirements Patterns [J]. 2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 250 - 254
- [38] An Application Security Model Based on Business Process in Information System [J]. 2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE), 2017,
- [39] Application of Component-Based Software Engineering in Building a Surveillance Robot [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 651 - 658
- [40] Requirements Engineering Based on Business Process Models: A Case Study [J]. 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, : 320 - 327