共 50 条
- [1] An Integrated Model for Software Security Testing Requirements [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 1891 - 1895
- [2] The security requirements behavior model for trustworthy software [J]. 2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 235 - +
- [3] A Novel Approach for Acquiring Training and Software Security Requirements [J]. EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,
- [5] A Regression Model Based Approach for Identifying Security Requirements in Open Source Software Development [J]. 2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2017, : 443 - 446
- [7] ABAC-Based Security Model for DDS [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3113 - 3124
- [8] SETAM: An Integrated Model for Software Security Testing Requirements Behavior [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11A): : 4435 - 4442
- [9] Risk-Based Security Requirements Model for Web Software [J]. 2022 IEEE 30TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2022, : 232 - 237
- [10] Security requirements for software development [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 116 - 122