共 50 条
- [31] Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 225 - 230
- [32] FESR: A Framework for Eliciting Security Requirements based on Integration of Common Criteria and Weakness Detection Formal Model 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS), 2017, : 352 - 363
- [33] A method to generate traverse paths for eliciting missing requirements PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2019), 2019,
- [35] Knowledge Base for an Intelligent System in order to Identify Security Requirements for Government Agencies Software Projects 20TH INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2016), 2016, 76
- [36] Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases WOSIS 2011: SECURITY IN INFORMATION SYSTEMS, 2011, : 103 - 112
- [38] The method of Constructing Chinese Knowledge Base based on open source English Knowledge Base PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ECONOMICS, SOCIAL SCIENCE, ARTS, EDUCATION AND MANAGEMENT ENGINEERING (ESSAEME), 2016, 71 : 549 - 552
- [39] Eliciting tacit knowledge from spoken discourse about requirements analysis ORGANISATIONAL CHALLENGES FOR KNOWLEDGE MANAGEMENT, 2005, : 143 - 160
- [40] Measuring IT security - A method based on common criteria's security functional requirements PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 226 - 233