共 50 条
- [1] Analyzing and Evaluating Security Features in Software Requirements [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 26 - 30
- [3] Empirically analyzing object-oriented software evolution [J]. JOURNAL OF OBJECT-ORIENTED PROGRAMMING, 1998, 11 (05): : 15 - 19
- [5] Security requirements for software development [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 116 - 122
- [7] Identifying requirements for network security software [J]. SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 539 - 543
- [9] Security requirements in software product lines [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 442 - +
- [10] Capturing security requirements for software systems [J]. JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 463 - 472