共 50 条
- [2] Problem-Based Security Requirements Elicitation and Refinement with PresSuRE [J]. SOFTWARE TECHNOLOGIES, ICSOFT 2014, 2015, 555 : 311 - 330
- [3] Problem-based Elicitation of Security Requirements The ProCOR Method [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2018, : 26 - 38
- [4] Collaboration in Problem-Based E-Learning: Requirements Engineering Activity [J]. PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 233 - 237
- [6] A Trust Algorithm based on the Latent Trust from Users to Items [J]. PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 : 834 - 846