共 50 条
- [41] A Review Paper : Security Requirement Patterns for a Secure Software Development [J]. 2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA SCIENCES (AIDAS2019), 2019, : 146 - 151
- [42] Applying a Requirement Engineering Based Approach to Evaluate the Security Requirements Engineering Methodologies [J]. 33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1316 - 1318
- [43] A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce Security [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013), 2013, : 366 - 371
- [44] Integrating Security and Privacy in Quantum Software Engineering [J]. PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 538 - 547
- [45] Ontology Based Patterns for Software Security Engineering [J]. ADVANCES IN KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, 2012, 243 : 406 - 419
- [46] Software Architectural Design meets Security Engineering [J]. 16TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS, 2009, : 109 - 118
- [47] Security and Software Engineering: Analyzing Effort and Cost [J]. THIRD INTERNATIONAL CONFERENCE ON ADVANCES AND TRENDS IN SOFTWARE ENGINEERING (SOFTENG 2017), 2017, : 110 - 113
- [48] The Study on Network Security based on Software Engineering [J]. FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
- [49] Software Security Requirements Engineering: State of the Art [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 313 - 322
- [50] Vulnerabilities and Threats in Cloud Software Engineering Security [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1822 - 1831