共 50 条
- [31] Identification of Security Requirements in Systems of Systems by Functional Security Analysis ARCHITECTING DEPENDABLE SYSTEMS VII, 2010, 6420 : 74 - 96
- [32] Formal analysis of safety and security requirements of critical systems supported by an extended STPA methodology 2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 174 - 180
- [33] Literature Review of Machine Learning and Threat Intelligence in Cloud Security IEEE ACCESS, 2025, 13 : 11663 - 11678
- [34] Literature Review of Machine Learning and Threat Intelligence in Cloud Security IEEE ACCESS, 2025, 13 : 11663 - 11678
- [35] Security Requirements Prioritization Based on Threat Modeling and Valuation Graph CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2011, 206 : 142 - 152
- [36] An Experience Report in Requirements Elicitation for Accessible E-Learning Systems 2010 15TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2010), 2010, : 259 - 261
- [37] Requirements Elicitation for Game-based Language Learning Application 4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 86 - 94
- [38] IoT Security: A Comparative Analysis of Intrusion Detection Systems Based on Machine Learning, Deep Learning and Transfer Learning Techniques ADVANCES IN SMART MEDICAL, IOT & ARTIFICIAL INTELLIGENCE, VOL 2, ICSMAI 2024, 2024, 12 : 35 - 48
- [39] Landscape of Requirements Engineering for Machine Learning-based AI Systems 2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE WORKSHOPS (APSECW 2021), 2021, : 5 - 8
- [40] A taxonomy for scenario use in requirements elicitation and analysis of software systems ECBS '99, IEEE CONFERENCE AND WORKSHOP ON ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 1999, : 232 - 238