共 50 条
- [32] Normalizing Security Events with a Hierarchical Knowledge Base INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2015, 2015, 9311 : 237 - 248
- [33] A Framework to Construct Knowledge Base for Cyber Security 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 242 - 248
- [34] CPIS-compliance Security Requirement Analysis for Software Development PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 624 - 629
- [35] A Co-occurrence Recommendation Model of Software Security Requirement 2019 13TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING (TASE 2019), 2019, : 41 - 48
- [36] A Review Paper : Security Requirement Patterns for a Secure Software Development 2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA SCIENCES (AIDAS2019), 2019, : 146 - 151
- [37] Security modeling and tool support advantages FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 537 - 542
- [39] Software support for managing the security of the transmission system CEPS (Czech Power Transmition System) PROCEEDINGS OF THE 12TH INTERNATIONAL SCIENTIFIC CONFERENCE ELECTRIC POWER ENGINEERING 2011, 2011, : 21 - 24
- [40] Toward improved software security testing using a cyber warfare opposing force (CW OPFOR): the knowledge base design Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 130 - 141