共 50 条
- [1] Eliciting security requirements method based on safety knowledge base Communications in Computer and Information Science, 2013, 332 : 109 - 121
- [2] Modeling and Utilizing Security Knowledge for Eliciting Security Requirements ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 236 - 247
- [4] Eliciting dependability requirements: A knowledge-based approach Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (2A): : 188 - 193
- [7] Eliciting Security Requirements - An Experience Report REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2023, 2023, 13975 : 351 - 365
- [8] Eliciting security requirements by misuse cases 37TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 120 - 143
- [10] Eliciting security requirements through misuse activities DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, : 328 - +