共 50 条
- [31] Analyzing the Requirements for a Robust Security Criteria and Management of Multi Level Security in the Clouds DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2011, 2011, 8062
- [32] High robustness requirements in a Common Criteria protection profile FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, : 66 - +
- [33] Security Requirements Engineering in the Wild: A Survey of Common Practices 2011 35TH IEEE ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2011, : 314 - 319
- [34] Towards a Common Security and Privacy Requirements Elicitation Methodology GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
- [36] Security Requirements Engineering Process for Web Applications INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 2799 - 2807
- [37] Security requirements engineering; State of the art and research challenges IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 985 - 990
- [38] Network Security Challenges in Android Applications PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 327 - 332
- [39] Mobile RFID applications and security challenges INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 194 - +
- [40] Internet of Everything: Applications, and Security Challenges 4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 285 - +