共 50 条
- [41] Effective security requirements analysis: HAZOP and use cases INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 416 - 427
- [43] Eliciting Operations Requirements for Applications 2013 1ST INTERNATIONAL WORKSHOP ON RELEASE ENGINEERING (RELENG), 2013, : 5 - 8
- [47] Using the common criteria to elicit security requirements with use cases PROCEEDINGS OF THE IEEE SOUTHEASTCON 2006, 2006, : 273 - 278
- [48] FESR: A Framework for Eliciting Security Requirements based on Integration of Common Criteria and Weakness Detection Formal Model 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS), 2017, : 352 - 363