共 50 条
- [2] Requirements model generation to support requirements elicitation: the Secure Tropos experience Automated Software Engineering, 2008, 15 : 149 - 173
- [3] A Combined Process for Elicitation and Analysis of Safety and Security Requirements ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2012, 2012, 113 : 347 - 361
- [4] A Security Ontology for Security Requirements Elicitation ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
- [5] Safety-Focused Security Requirements Elicitation for Medical Device Software 2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2017, : 134 - 143
- [6] Security Requirements Elicitation and Modeling Authorizations SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250
- [9] Security Requirements Elicitation and Assessment Mechanism (SecREAM) 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1862 - 1866
- [10] Requirements Elicitation and Derivation of Security Policy Templates 2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 283 - 292