共 50 条
- [21] Analyzing and Evaluating Security Features in Software Requirements [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 26 - 30
- [22] Security requirements for ubiquitous software development site [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2006, 4252 : 836 - 843
- [23] Software Security Requirements Engineering: State of the Art [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 313 - 322
- [24] Security requirements variability for software product lines [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1413 - +
- [25] Requirements for Security Enhancements to Legacy Software with RUP [J]. INFORMATION SECURITY JOURNAL, 2010, 19 (04): : 226 - 236
- [27] Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 334 - 340
- [29] Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systems [J]. International Journal of Information Security, 2016, 15 : 319 - 334
- [30] Security Guarantees for Automated Software Testing [J]. PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21), 2021, : 1610 - 1614