Artykuły w czasopismach na temat „Security Requirement Elicitation”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 40 najlepszych artykułów w czasopismach naukowych na temat „Security Requirement Elicitation”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
GUTIERREZ, C., E. FERNANDEZ-MEDINA i M. PIATTINI. "Web Services-Based Security Requirement Elicitation". IEICE Transactions on Information and Systems E90-D, nr 9 (1.09.2007): 1374–87. http://dx.doi.org/10.1093/ietisy/e90-d.9.1374.
Pełny tekst źródłaKumar, B. Sathis. "EVALUATION OF CAPTURING ARCHITECTURALLY SIGNIFICANT REQUIREMENTS". Asian Journal of Pharmaceutical and Clinical Research 10, nr 13 (1.04.2017): 122. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19589.
Pełny tekst źródłaKumar, Devendra, Anil Kumar i Laxman Singh. "Non-functional Requirements Elicitation in Agile Base Models". Webology 19, nr 1 (20.01.2022): 1992–2018. http://dx.doi.org/10.14704/web/v19i1/web19135.
Pełny tekst źródłaBeckers, Kristian, Isabelle Côté, Ludger Goeke, Selim Güler i Maritta Heisel. "A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain". International Journal of Secure Software Engineering 5, nr 2 (kwiecień 2014): 20–43. http://dx.doi.org/10.4018/ijsse.2014040102.
Pełny tekst źródłaRehman, Shafiq, i Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems". Technologies 6, nr 3 (12.07.2018): 65. http://dx.doi.org/10.3390/technologies6030065.
Pełny tekst źródłaFaroom, Saeed. "A Review of Requirement Engineering Process Models, Tools & Methodologies". International Journal of Energetica 4, nr 1 (30.06.2019): 44. http://dx.doi.org/10.47238/ijeca.v4i1.86.
Pełny tekst źródłaVegendla, Aparna, Anh Nguyen Duc, Shang Gao i Guttorm Sindre. "A Systematic Mapping Study on Requirements Engineering in Software Ecosystems". Journal of Information Technology Research 11, nr 1 (styczeń 2018): 49–69. http://dx.doi.org/10.4018/jitr.2018010104.
Pełny tekst źródłaISSA, ATOUM. "REQUIREMENTS ELICITATION APPROACH FOR CYBER SECURITY SYSTEMS". i-manager’s Journal on Software Engineering 10, nr 3 (2016): 1. http://dx.doi.org/10.26634/jse.10.3.4898.
Pełny tekst źródłaMatulevičius, Raimundas, Alex Norta i Silver Samarütel. "Security Requirements Elicitation from Airline Turnaround Processes". Business & Information Systems Engineering 60, nr 1 (15.01.2018): 3–20. http://dx.doi.org/10.1007/s12599-018-0518-4.
Pełny tekst źródłaSchmitt, Christian, i Peter Liggesmeyer. "Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources". Complex Systems Informatics and Modeling Quarterly, nr 3 (30.07.2015): 15–34. http://dx.doi.org/10.7250/csimq.2015-3.02.
Pełny tekst źródłaKavallieratos, Georgios, Sokratis Katsikas i Vasileios Gkioulos. "SafeSec Tropos: Joint security and safety requirements elicitation". Computer Standards & Interfaces 70 (czerwiec 2020): 103429. http://dx.doi.org/10.1016/j.csi.2020.103429.
Pełny tekst źródłaSAEKI, MOTOSHI, SHINPEI HAYASHI i HARUHIKO KAIYA. "ENHANCING GOAL-ORIENTED SECURITY REQUIREMENTS ANALYSIS USING COMMON CRITERIA-BASED KNOWLEDGE". International Journal of Software Engineering and Knowledge Engineering 23, nr 05 (czerwiec 2013): 695–720. http://dx.doi.org/10.1142/s0218194013500174.
Pełny tekst źródłaFoley, Simon N., i Vivien Rooney. "A grounded theory approach to security policy elicitation". Information & Computer Security 26, nr 4 (8.10.2018): 454–71. http://dx.doi.org/10.1108/ics-12-2017-0086.
Pełny tekst źródłaWeber, Stefan G., i Prima Gustiené. "Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles". International Journal of Information Systems for Crisis Response and Management 5, nr 2 (kwiecień 2013): 1–18. http://dx.doi.org/10.4018/jiscrm.2013040101.
Pełny tekst źródłaRaspotnig, Christian, Peter Karpati i Andreas L. Opdahl. "Combined Assessment of Software Safety and Security Requirements". Journal of Cases on Information Technology 20, nr 1 (styczeń 2018): 46–69. http://dx.doi.org/10.4018/jcit.2018010104.
Pełny tekst źródłaSaikayasit, Rose, Alex W. Stedmon i Glyn Lawson. "User Requirements Elicitation in Security and Counter-Terrorism: A Human Factors Approach". Journal of Police and Criminal Psychology 28, nr 2 (19.06.2013): 162–70. http://dx.doi.org/10.1007/s11896-013-9129-7.
Pełny tekst źródłaArogundade, O. T., A. T. Akinwale, Z. Jin i X. G. Yang. "A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements". International Journal of Information Security and Privacy 5, nr 4 (październik 2011): 8–30. http://dx.doi.org/10.4018/jisp.2011100102.
Pełny tekst źródłaAndrade, Roberto, Jenny Torres, Iván Ortiz-Garcés, Jorge Miño i Luis Almeida. "An Exploratory Study Gathering Security Requirements for the Software Development Process". Electronics 12, nr 17 (25.08.2023): 3594. http://dx.doi.org/10.3390/electronics12173594.
Pełny tekst źródłaFaily, Shamal. "Engaging stakeholders during late stage security design with assumption personas". Information & Computer Security 23, nr 4 (12.10.2015): 435–46. http://dx.doi.org/10.1108/ics-10-2014-0066.
Pełny tekst źródłaZareen, Saima, Adeel Akram i Shoab Ahmad Khan. "Security Requirements Engineering Framework with BPMN 2.0.2 Extension Model for Development of Information Systems". Applied Sciences 10, nr 14 (20.07.2020): 4981. http://dx.doi.org/10.3390/app10144981.
Pełny tekst źródłaKalloniatis, Christos, Costas Lambrinoudakis, Mathias Musahl, Athanasios Kanatas i Stefanos Gritzalis. "Incorporating privacy by design in body sensor networks for medical applications: A privacy and data protection framework". Computer Science and Information Systems, nr 00 (2020): 57. http://dx.doi.org/10.2298/csis200922057k.
Pełny tekst źródłaAdee, Rose, i Haralambos Mouratidis. "A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography". Sensors 22, nr 3 (1.02.2022): 1109. http://dx.doi.org/10.3390/s22031109.
Pełny tekst źródłaArgyropoulos, Nikolaos, Konstantinos Angelopoulos, Haralambos Mouratidis i Andrew Fish. "Risk-aware decision support with constrained goal models". Information & Computer Security 26, nr 4 (8.10.2018): 472–90. http://dx.doi.org/10.1108/ics-01-2018-0010.
Pełny tekst źródłaTsohou, Aggeliki, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni i Beatriz Gallego-Nicasio Crespo. "Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform". Information & Computer Security 28, nr 4 (16.04.2020): 531–53. http://dx.doi.org/10.1108/ics-01-2020-0002.
Pełny tekst źródłaMarques, Johnny, i Adilson Marques da Cunha. "ARES: An Agile Requirements Specification Process for Regulated Environments". International Journal of Software Engineering and Knowledge Engineering 29, nr 10 (październik 2019): 1403–38. http://dx.doi.org/10.1142/s021819401950044x.
Pełny tekst źródłaGhufron, Kharisma Muzaki, Wahyu Andhyka Kusuma i Fauzan Fauzan. "PENGGUNAAN USER PERSONA UNTUK EVALUASI DAN MENINGKATKAN EKSPEKTASI PENGGUNA DALAM KEBUTUHAN SISTEM INFORMASI AKADEMIK". SINTECH (Science and Information Technology) Journal 3, nr 2 (28.10.2020): 90–99. http://dx.doi.org/10.31598/sintechjournal.v3i2.587.
Pełny tekst źródłaCALVANESE, DIEGO, MARCO MONTALI, MARLON DUMAS i FABRIZIO M. MAGGI. "Semantic DMN: Formalizing and Reasoning About Decisions in the Presence of Background Knowledge". Theory and Practice of Logic Programming 19, nr 04 (18.01.2019): 536–73. http://dx.doi.org/10.1017/s1471068418000479.
Pełny tekst źródłaVargas, Cyntia, Jens Bürger, Fabien Viertel, Birgit Vogel-Heuser i Jan Jürjens. "System evolution through semi-automatic elicitation of security requirements: A Position Paper ⁎ ⁎Research supported by the DFG (German Research Foundation) in Priority Programme SPP1593: Design for Future - Managed Software Evolution (VO 937/20-2 and JU 2734/2-2)." IFAC-PapersOnLine 51, nr 10 (2018): 64–69. http://dx.doi.org/10.1016/j.ifacol.2018.06.238.
Pełny tekst źródłaMajore, Ginta. "ENTERPRISE MODELLING METHODOLOGY FOR SOCIO-CYBER-PHYSICAL SYSTEMS DESIGN: CASE FROM CYBERSECURITY EDUCATION AND CLIMATE-SMART AGRICULTURE". SOCIETY. TECHNOLOGY. SOLUTIONS. Proceedings of the International Scientific Conference 2 (8.04.2022): 4. http://dx.doi.org/10.35363/via.sts.2022.74.
Pełny tekst źródłaMajore, Ginta. "ENTERPRISE MODELLING METHODOLOGY FOR SOCIO-CYBER-PHYSICAL SYSTEMS DESIGN: CASE FROM CYBERSECURITY EDUCATION AND CLIMATE-SMART AGRICULTURE". SOCIETY. TECHNOLOGY. SOLUTIONS. Proceedings of the International Scientific Conference 2 (8.04.2022): 4. http://dx.doi.org/10.35363/via.sts.2022.74.
Pełny tekst źródła"Quantitative Analysis of Requirement Elicitation Techniques through FANP: Security Perspective". International Journal of Recent Technology and Engineering 8, nr 5 (30.01.2020): 3550–58. http://dx.doi.org/10.35940/ijrte.e6402.018520.
Pełny tekst źródła"Optimizing the Impact of Security Attributes in Requirement Elicitation Techniques using FAHP". International Journal of Innovative Technology and Exploring Engineering 9, nr 4 (10.02.2020): 1656–61. http://dx.doi.org/10.35940/ijitee.d1213.029420.
Pełny tekst źródła"Detection of Vulnerability Injection Point in Software Development Lifecycle for Effective Countermeasures". International Journal of Engineering and Advanced Technology 9, nr 3 (29.02.2020): 2715–21. http://dx.doi.org/10.35940/ijeat.c6045.029320.
Pełny tekst źródłaMatulevičius, Raimundas, i Naved Ahmed. "Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns". it – Information Technology 55, nr 6 (1.01.2013). http://dx.doi.org/10.1515/itit.2013.2002.
Pełny tekst źródła"Secure MEReq: A Tool Support to Check for Completeness of Security Requirements". International Journal of Recent Technology and Engineering 8, nr 2S11 (2.11.2019): 768–71. http://dx.doi.org/10.35940/ijrte.b1125.0982s1119.
Pełny tekst źródłaHibshi, Hanan, Stephanie Jones i Travis Breaux. "A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements". IEEE Transactions on Dependable and Secure Computing, 2021, 1. http://dx.doi.org/10.1109/tdsc.2021.3103109.
Pełny tekst źródłaSaleh, Emam, i Fahd ElShahrani. "Extracting Functional and Non-Functional Requirements for E-learning Systems". International Journal of Educational Sciences and Arts 2, nr 5 (2023). http://dx.doi.org/10.59992/ijesa.2023.v2n5p3.
Pełny tekst źródłaDaun, Marian, Alicia M. Grubb, Viktoria Stenkova i Bastian Tenbergen. "A systematic literature review of requirements engineering education". Requirements Engineering, 19.05.2022. http://dx.doi.org/10.1007/s00766-022-00381-9.
Pełny tekst źródłaBagriyanik, Selami, i Adem Karahoca. "Big data in software engineering: A systematic literature review". Global Journal of Information Technology 6, nr 1 (15.03.2016). http://dx.doi.org/10.18844/gjit.v6i1.397.
Pełny tekst źródłaTemate-Tiagueu, Yvette, Joseph Amlung, Dennis Stover, Philip Peters, John T. Brooks, Sridhar Papagari Sangareddy, Jina J. Dcruz i Kamran Ahmed. "Dashboard Prototype for Improved HIV Monitoring and Reporting for Indiana". Online Journal of Public Health Informatics 11, nr 1 (30.05.2019). http://dx.doi.org/10.5210/ojphi.v11i1.9699.
Pełny tekst źródła