共 50 条
- [2] Eliciting security requirements by misuse cases 37TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 120 - 143
- [3] Eliciting security requirements through misuse activities DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, : 328 - +
- [4] Eliciting Usable Security Requirements with Misusability Cases 2011 19TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2011, : 339 - 340
- [6] Eliciting Security Requirements - An Experience Report REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2023, 2023, 13975 : 351 - 365
- [7] Modeling and Utilizing Security Knowledge for Eliciting Security Requirements ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 236 - 247
- [8] Defining security requirements through misuse actions ADVANCED SOFTWARE ENGINEERING: EXPANDING THE FRONTIERS OF SOFTWARE TECHNOLOGY, 2006, 219 : 123 - +
- [9] A Serious Game for Eliciting Social Engineering Security Requirements 2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 16 - 25
- [10] Eliciting Security Requirements for Business Processes of Legacy Systems PRACTICE OF ENTERPRISE MODELING, POEM 2015, 2015, 235 : 91 - 107