共 50 条
- [31] INCORPORATING SECURITY CONSIDERATIONS INTO OPTIMAL PRODUCT ARCHITECTURE AND COMPONENT SHARING DECISION IN PRODUCT FAMILY DESIGN PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, DETC 2010, VOL 5, 2010, : 507 - +
- [33] Incorporating the Voice of the Customer into Mass-Market Software Product Management PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 1397 - 1404
- [34] The possibilities of ensuring the security of the software product in the conditions of unauthorized access ECONOMIC ANNALS-XXI, 2021, 189 (5-6): : 90 - 100
- [36] Checking Software Security Using EFSMs 2017 18TH INTERNATIONAL CONFERENCE OF YOUNG SPECIALISTS ON MICRO/NANOTECHNOLOGIES AND ELECTRON DEVICES (EDM), 2017, : 87 - 90
- [37] Security software using neural networks IECON '98 - PROCEEDINGS OF THE 24TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-4, 1998, : 72 - 74
- [38] Incorporating security requirements into communication protocols in multi-agent software systems EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 159 - 160
- [39] Using Developer Activity Data to Enhance Awareness during Collaborative Software Development Computer Supported Cooperative Work (CSCW), 2009, 18
- [40] Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge 2014 IEEE 22ND INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2014, : 103 - 112