Artículos de revistas sobre el tema "Security Requirement Elicitation"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 40 mejores artículos de revistas para su investigación sobre el tema "Security Requirement Elicitation".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
GUTIERREZ, C., E. FERNANDEZ-MEDINA y M. PIATTINI. "Web Services-Based Security Requirement Elicitation". IEICE Transactions on Information and Systems E90-D, n.º 9 (1 de septiembre de 2007): 1374–87. http://dx.doi.org/10.1093/ietisy/e90-d.9.1374.
Texto completoKumar, B. Sathis. "EVALUATION OF CAPTURING ARCHITECTURALLY SIGNIFICANT REQUIREMENTS". Asian Journal of Pharmaceutical and Clinical Research 10, n.º 13 (1 de abril de 2017): 122. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19589.
Texto completoKumar, Devendra, Anil Kumar y Laxman Singh. "Non-functional Requirements Elicitation in Agile Base Models". Webology 19, n.º 1 (20 de enero de 2022): 1992–2018. http://dx.doi.org/10.14704/web/v19i1/web19135.
Texto completoBeckers, Kristian, Isabelle Côté, Ludger Goeke, Selim Güler y Maritta Heisel. "A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain". International Journal of Secure Software Engineering 5, n.º 2 (abril de 2014): 20–43. http://dx.doi.org/10.4018/ijsse.2014040102.
Texto completoRehman, Shafiq y Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems". Technologies 6, n.º 3 (12 de julio de 2018): 65. http://dx.doi.org/10.3390/technologies6030065.
Texto completoFaroom, Saeed. "A Review of Requirement Engineering Process Models, Tools & Methodologies". International Journal of Energetica 4, n.º 1 (30 de junio de 2019): 44. http://dx.doi.org/10.47238/ijeca.v4i1.86.
Texto completoVegendla, Aparna, Anh Nguyen Duc, Shang Gao y Guttorm Sindre. "A Systematic Mapping Study on Requirements Engineering in Software Ecosystems". Journal of Information Technology Research 11, n.º 1 (enero de 2018): 49–69. http://dx.doi.org/10.4018/jitr.2018010104.
Texto completoISSA, ATOUM. "REQUIREMENTS ELICITATION APPROACH FOR CYBER SECURITY SYSTEMS". i-manager’s Journal on Software Engineering 10, n.º 3 (2016): 1. http://dx.doi.org/10.26634/jse.10.3.4898.
Texto completoMatulevičius, Raimundas, Alex Norta y Silver Samarütel. "Security Requirements Elicitation from Airline Turnaround Processes". Business & Information Systems Engineering 60, n.º 1 (15 de enero de 2018): 3–20. http://dx.doi.org/10.1007/s12599-018-0518-4.
Texto completoSchmitt, Christian y Peter Liggesmeyer. "Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources". Complex Systems Informatics and Modeling Quarterly, n.º 3 (30 de julio de 2015): 15–34. http://dx.doi.org/10.7250/csimq.2015-3.02.
Texto completoKavallieratos, Georgios, Sokratis Katsikas y Vasileios Gkioulos. "SafeSec Tropos: Joint security and safety requirements elicitation". Computer Standards & Interfaces 70 (junio de 2020): 103429. http://dx.doi.org/10.1016/j.csi.2020.103429.
Texto completoSAEKI, MOTOSHI, SHINPEI HAYASHI y HARUHIKO KAIYA. "ENHANCING GOAL-ORIENTED SECURITY REQUIREMENTS ANALYSIS USING COMMON CRITERIA-BASED KNOWLEDGE". International Journal of Software Engineering and Knowledge Engineering 23, n.º 05 (junio de 2013): 695–720. http://dx.doi.org/10.1142/s0218194013500174.
Texto completoFoley, Simon N. y Vivien Rooney. "A grounded theory approach to security policy elicitation". Information & Computer Security 26, n.º 4 (8 de octubre de 2018): 454–71. http://dx.doi.org/10.1108/ics-12-2017-0086.
Texto completoWeber, Stefan G. y Prima Gustiené. "Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles". International Journal of Information Systems for Crisis Response and Management 5, n.º 2 (abril de 2013): 1–18. http://dx.doi.org/10.4018/jiscrm.2013040101.
Texto completoRaspotnig, Christian, Peter Karpati y Andreas L. Opdahl. "Combined Assessment of Software Safety and Security Requirements". Journal of Cases on Information Technology 20, n.º 1 (enero de 2018): 46–69. http://dx.doi.org/10.4018/jcit.2018010104.
Texto completoSaikayasit, Rose, Alex W. Stedmon y Glyn Lawson. "User Requirements Elicitation in Security and Counter-Terrorism: A Human Factors Approach". Journal of Police and Criminal Psychology 28, n.º 2 (19 de junio de 2013): 162–70. http://dx.doi.org/10.1007/s11896-013-9129-7.
Texto completoArogundade, O. T., A. T. Akinwale, Z. Jin y X. G. Yang. "A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements". International Journal of Information Security and Privacy 5, n.º 4 (octubre de 2011): 8–30. http://dx.doi.org/10.4018/jisp.2011100102.
Texto completoAndrade, Roberto, Jenny Torres, Iván Ortiz-Garcés, Jorge Miño y Luis Almeida. "An Exploratory Study Gathering Security Requirements for the Software Development Process". Electronics 12, n.º 17 (25 de agosto de 2023): 3594. http://dx.doi.org/10.3390/electronics12173594.
Texto completoFaily, Shamal. "Engaging stakeholders during late stage security design with assumption personas". Information & Computer Security 23, n.º 4 (12 de octubre de 2015): 435–46. http://dx.doi.org/10.1108/ics-10-2014-0066.
Texto completoZareen, Saima, Adeel Akram y Shoab Ahmad Khan. "Security Requirements Engineering Framework with BPMN 2.0.2 Extension Model for Development of Information Systems". Applied Sciences 10, n.º 14 (20 de julio de 2020): 4981. http://dx.doi.org/10.3390/app10144981.
Texto completoKalloniatis, Christos, Costas Lambrinoudakis, Mathias Musahl, Athanasios Kanatas y Stefanos Gritzalis. "Incorporating privacy by design in body sensor networks for medical applications: A privacy and data protection framework". Computer Science and Information Systems, n.º 00 (2020): 57. http://dx.doi.org/10.2298/csis200922057k.
Texto completoAdee, Rose y Haralambos Mouratidis. "A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography". Sensors 22, n.º 3 (1 de febrero de 2022): 1109. http://dx.doi.org/10.3390/s22031109.
Texto completoArgyropoulos, Nikolaos, Konstantinos Angelopoulos, Haralambos Mouratidis y Andrew Fish. "Risk-aware decision support with constrained goal models". Information & Computer Security 26, n.º 4 (8 de octubre de 2018): 472–90. http://dx.doi.org/10.1108/ics-01-2018-0010.
Texto completoTsohou, Aggeliki, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni y Beatriz Gallego-Nicasio Crespo. "Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform". Information & Computer Security 28, n.º 4 (16 de abril de 2020): 531–53. http://dx.doi.org/10.1108/ics-01-2020-0002.
Texto completoMarques, Johnny y Adilson Marques da Cunha. "ARES: An Agile Requirements Specification Process for Regulated Environments". International Journal of Software Engineering and Knowledge Engineering 29, n.º 10 (octubre de 2019): 1403–38. http://dx.doi.org/10.1142/s021819401950044x.
Texto completoGhufron, Kharisma Muzaki, Wahyu Andhyka Kusuma y Fauzan Fauzan. "PENGGUNAAN USER PERSONA UNTUK EVALUASI DAN MENINGKATKAN EKSPEKTASI PENGGUNA DALAM KEBUTUHAN SISTEM INFORMASI AKADEMIK". SINTECH (Science and Information Technology) Journal 3, n.º 2 (28 de octubre de 2020): 90–99. http://dx.doi.org/10.31598/sintechjournal.v3i2.587.
Texto completoCALVANESE, DIEGO, MARCO MONTALI, MARLON DUMAS y FABRIZIO M. MAGGI. "Semantic DMN: Formalizing and Reasoning About Decisions in the Presence of Background Knowledge". Theory and Practice of Logic Programming 19, n.º 04 (18 de enero de 2019): 536–73. http://dx.doi.org/10.1017/s1471068418000479.
Texto completoVargas, Cyntia, Jens Bürger, Fabien Viertel, Birgit Vogel-Heuser y Jan Jürjens. "System evolution through semi-automatic elicitation of security requirements: A Position Paper ⁎ ⁎Research supported by the DFG (German Research Foundation) in Priority Programme SPP1593: Design for Future - Managed Software Evolution (VO 937/20-2 and JU 2734/2-2)." IFAC-PapersOnLine 51, n.º 10 (2018): 64–69. http://dx.doi.org/10.1016/j.ifacol.2018.06.238.
Texto completoMajore, Ginta. "ENTERPRISE MODELLING METHODOLOGY FOR SOCIO-CYBER-PHYSICAL SYSTEMS DESIGN: CASE FROM CYBERSECURITY EDUCATION AND CLIMATE-SMART AGRICULTURE". SOCIETY. TECHNOLOGY. SOLUTIONS. Proceedings of the International Scientific Conference 2 (8 de abril de 2022): 4. http://dx.doi.org/10.35363/via.sts.2022.74.
Texto completoMajore, Ginta. "ENTERPRISE MODELLING METHODOLOGY FOR SOCIO-CYBER-PHYSICAL SYSTEMS DESIGN: CASE FROM CYBERSECURITY EDUCATION AND CLIMATE-SMART AGRICULTURE". SOCIETY. TECHNOLOGY. SOLUTIONS. Proceedings of the International Scientific Conference 2 (8 de abril de 2022): 4. http://dx.doi.org/10.35363/via.sts.2022.74.
Texto completo"Quantitative Analysis of Requirement Elicitation Techniques through FANP: Security Perspective". International Journal of Recent Technology and Engineering 8, n.º 5 (30 de enero de 2020): 3550–58. http://dx.doi.org/10.35940/ijrte.e6402.018520.
Texto completo"Optimizing the Impact of Security Attributes in Requirement Elicitation Techniques using FAHP". International Journal of Innovative Technology and Exploring Engineering 9, n.º 4 (10 de febrero de 2020): 1656–61. http://dx.doi.org/10.35940/ijitee.d1213.029420.
Texto completo"Detection of Vulnerability Injection Point in Software Development Lifecycle for Effective Countermeasures". International Journal of Engineering and Advanced Technology 9, n.º 3 (29 de febrero de 2020): 2715–21. http://dx.doi.org/10.35940/ijeat.c6045.029320.
Texto completoMatulevičius, Raimundas y Naved Ahmed. "Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns". it – Information Technology 55, n.º 6 (1 de enero de 2013). http://dx.doi.org/10.1515/itit.2013.2002.
Texto completo"Secure MEReq: A Tool Support to Check for Completeness of Security Requirements". International Journal of Recent Technology and Engineering 8, n.º 2S11 (2 de noviembre de 2019): 768–71. http://dx.doi.org/10.35940/ijrte.b1125.0982s1119.
Texto completoHibshi, Hanan, Stephanie Jones y Travis Breaux. "A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements". IEEE Transactions on Dependable and Secure Computing, 2021, 1. http://dx.doi.org/10.1109/tdsc.2021.3103109.
Texto completoSaleh, Emam y Fahd ElShahrani. "Extracting Functional and Non-Functional Requirements for E-learning Systems". International Journal of Educational Sciences and Arts 2, n.º 5 (2023). http://dx.doi.org/10.59992/ijesa.2023.v2n5p3.
Texto completoDaun, Marian, Alicia M. Grubb, Viktoria Stenkova y Bastian Tenbergen. "A systematic literature review of requirements engineering education". Requirements Engineering, 19 de mayo de 2022. http://dx.doi.org/10.1007/s00766-022-00381-9.
Texto completoBagriyanik, Selami y Adem Karahoca. "Big data in software engineering: A systematic literature review". Global Journal of Information Technology 6, n.º 1 (15 de marzo de 2016). http://dx.doi.org/10.18844/gjit.v6i1.397.
Texto completoTemate-Tiagueu, Yvette, Joseph Amlung, Dennis Stover, Philip Peters, John T. Brooks, Sridhar Papagari Sangareddy, Jina J. Dcruz y Kamran Ahmed. "Dashboard Prototype for Improved HIV Monitoring and Reporting for Indiana". Online Journal of Public Health Informatics 11, n.º 1 (30 de mayo de 2019). http://dx.doi.org/10.5210/ojphi.v11i1.9699.
Texto completo