共 50 条
- [1] Identifying Security Requirements Based on Linguistic Analysis and Machine Learning 2017 24TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2017), 2017, : 388 - 397
- [2] Towards a Common Security and Privacy Requirements Elicitation Methodology GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
- [3] Machine learning in requirements elicitation: a literature review AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, 2022, 36
- [6] Hardware Attack and Assurance with Machine Learning: A Security Threat to Circuits and Systems APCCAS 2020: PROCEEDINGS OF THE 2020 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2020), 2020, : 1 - 1
- [7] The Research and Application of Security Requirements Analysis Methodology of Information Systems 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 30 - 36
- [8] A Combined Process for Elicitation and Analysis of Safety and Security Requirements ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2012, 2012, 113 : 347 - 361
- [9] Cyber Security: Threat Detection Model based on Machine learning Algorithm PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 239 - 243
- [10] A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements Requirements Engineering, 2011, 16 : 3 - 32