共 50 条
- [21] Integrating functional and security requirements with use case decomposition ICECCS 2006: 11TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2006, : 57 - +
- [23] Integrating safety and security requirements into design of an embedded system 12th Asia-Pacific Software Engineering Conference, Proceedings, 2005, : 629 - 636
- [24] Security Attack Analysis Using Attack Patterns 2016 IEEE TENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2016, : 513 - 525
- [25] Integrating security patterns into the electronic invoicing process PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, 2009, : 150 - 154
- [26] Framework for Engineering Complex Security Requirements Patterns 2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 250 - 254
- [27] Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS (CAISE), 2013, 148 : 478 - 489
- [28] Modeling telemedicine security requirements using a SysML security extension PROCEEDINGS OF 2018 6TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2018, : 77 - 82
- [29] Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis 2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 714 - 724
- [30] Identification of Security Requirements in Systems of Systems by Functional Security Analysis ARCHITECTING DEPENDABLE SYSTEMS VII, 2010, 6420 : 74 - 96