共 50 条
- [22] Securing Smart Home: Technologies, Security Challenges, and Security Requirements 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 67 - 72
- [23] Reusable Security Requirements for Healthcare Applications 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 380 - 385
- [24] Concepts and criteria defining emerging microbiome applications MICROBIAL BIOTECHNOLOGY, 2024, 17 (09):
- [25] Reusable security requirements for healthcare applications Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, 2009, : 380 - 385
- [26] Security and Privacy in Video Surveillance: Requirements and Challenges ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 169 - 184
- [27] Security Applications and Challenges in Blockchain 2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2019,
- [28] Formal Verification of Security Specifications with Common Criteria APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1506 - +
- [29] Common Criteria Based Security Scenario Verification SOFTWARE AND DATA TECHNOLOGIES, 2009, 47 : 37 - 47
- [30] Security requirements elicitation via weaving scenarios based on security evaluation criteria USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 70 - 79