共 50 条
- [41] Security requirements elicitation via weaving scenarios based on security evaluation criteria USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 70 - 79
- [42] TOWARDS A STRATEGIC REQUIREMENTS ELICITATION A Proposal of the PRINCE Model ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 1, 2009, : 145 - +
- [43] Towards a multiple ontology framework for requirements elicitation and reuse COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 189 - +
- [44] Towards Goal-Oriented Software Requirements Elicitation 2021 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2021, : 596 - 599
- [45] Prototyping for requirements elicitation and validation: A participative prototype evaluation methodology ASSOCIATION FOR INFORMATION SYSTEMS PROCEEDINGS OF THE AMERICAS CONFERENCE ON INFORMATION SYSTEMS, 1998, : 798 - 800
- [47] Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners Requirements Engineering, 2023, 28 : 177 - 194
- [48] The hidden meta-requirements of security and privacy FIFTH IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2001, : 10 - 10
- [50] Security and Privacy in Video Surveillance: Requirements and Challenges ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 169 - 184