共 50 条
- [21] Software Security Requirements Engineering: State of the Art [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 313 - 322
- [22] Security requirements variability for software product lines [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1413 - +
- [23] The security requirements behavior model for trustworthy software [J]. 2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 235 - +
- [24] Requirements for Security Enhancements to Legacy Software with RUP [J]. INFORMATION SECURITY JOURNAL, 2010, 19 (04): : 226 - 236
- [25] Evaluating Cryptographic Security Requirements in IoT Gateways [J]. 2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
- [26] Modeling and Evaluating Personas with Software Explainability Requirements [J]. HUMAN-COMPUTER INTERACTION, HCI-COLLAB, 2021, 1478 : 136 - 149
- [28] Analyzing the Requirements for a Robust Security Criteria and Management of Multi Level Security in the Clouds [J]. DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2011, 2011, 8062
- [30] A Neural Network Based Security Tool for Analyzing Software [J]. TECHNOLOGICAL INNOVATION FOR THE INTERNET OF THINGS, 2013, 394 : 80 - 87