共 50 条
- [41] Using Malware Analysis to Improve Security Requirements on Future Systems 2014 IEEE 1ST WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2014, : 37 - 41
- [42] A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations CONCEPTUAL MODELING - ER 2009, PROCEEDINGS, 2009, 5829 : 99 - +
- [43] Using contextual security policies for threat response DETECTION OF INTRUSIONS AND MALWARE & VULNERABILITY ASSESSMENT, PROCEEDINGS, 2006, 4064 : 109 - 128
- [45] Using trust assumptions with security requirements Requirements Engineering, 2006, 11 : 138 - 151
- [47] Hazard analysis for security protocol requirements ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY, 2001, 78 : 75 - 92
- [49] Quantum Cryptography - The Analysis of Security Requirements ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 814 - 817
- [50] The ISDF Framework: Integrating Security Patterns and Best Practices ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 17 - 28