Статті в журналах з теми "Security Requirement Elicitation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-40 статей у журналах для дослідження на тему "Security Requirement Elicitation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
GUTIERREZ, C., E. FERNANDEZ-MEDINA, and M. PIATTINI. "Web Services-Based Security Requirement Elicitation." IEICE Transactions on Information and Systems E90-D, no. 9 (September 1, 2007): 1374–87. http://dx.doi.org/10.1093/ietisy/e90-d.9.1374.
Повний текст джерелаKumar, B. Sathis. "EVALUATION OF CAPTURING ARCHITECTURALLY SIGNIFICANT REQUIREMENTS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 122. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19589.
Повний текст джерелаKumar, Devendra, Anil Kumar, and Laxman Singh. "Non-functional Requirements Elicitation in Agile Base Models." Webology 19, no. 1 (January 20, 2022): 1992–2018. http://dx.doi.org/10.14704/web/v19i1/web19135.
Повний текст джерелаBeckers, Kristian, Isabelle Côté, Ludger Goeke, Selim Güler, and Maritta Heisel. "A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain." International Journal of Secure Software Engineering 5, no. 2 (April 2014): 20–43. http://dx.doi.org/10.4018/ijsse.2014040102.
Повний текст джерелаRehman, Shafiq, and Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems." Technologies 6, no. 3 (July 12, 2018): 65. http://dx.doi.org/10.3390/technologies6030065.
Повний текст джерелаFaroom, Saeed. "A Review of Requirement Engineering Process Models, Tools & Methodologies." International Journal of Energetica 4, no. 1 (June 30, 2019): 44. http://dx.doi.org/10.47238/ijeca.v4i1.86.
Повний текст джерелаVegendla, Aparna, Anh Nguyen Duc, Shang Gao, and Guttorm Sindre. "A Systematic Mapping Study on Requirements Engineering in Software Ecosystems." Journal of Information Technology Research 11, no. 1 (January 2018): 49–69. http://dx.doi.org/10.4018/jitr.2018010104.
Повний текст джерелаISSA, ATOUM. "REQUIREMENTS ELICITATION APPROACH FOR CYBER SECURITY SYSTEMS." i-manager’s Journal on Software Engineering 10, no. 3 (2016): 1. http://dx.doi.org/10.26634/jse.10.3.4898.
Повний текст джерелаMatulevičius, Raimundas, Alex Norta, and Silver Samarütel. "Security Requirements Elicitation from Airline Turnaround Processes." Business & Information Systems Engineering 60, no. 1 (January 15, 2018): 3–20. http://dx.doi.org/10.1007/s12599-018-0518-4.
Повний текст джерелаSchmitt, Christian, and Peter Liggesmeyer. "Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources." Complex Systems Informatics and Modeling Quarterly, no. 3 (July 30, 2015): 15–34. http://dx.doi.org/10.7250/csimq.2015-3.02.
Повний текст джерелаKavallieratos, Georgios, Sokratis Katsikas, and Vasileios Gkioulos. "SafeSec Tropos: Joint security and safety requirements elicitation." Computer Standards & Interfaces 70 (June 2020): 103429. http://dx.doi.org/10.1016/j.csi.2020.103429.
Повний текст джерелаSAEKI, MOTOSHI, SHINPEI HAYASHI, and HARUHIKO KAIYA. "ENHANCING GOAL-ORIENTED SECURITY REQUIREMENTS ANALYSIS USING COMMON CRITERIA-BASED KNOWLEDGE." International Journal of Software Engineering and Knowledge Engineering 23, no. 05 (June 2013): 695–720. http://dx.doi.org/10.1142/s0218194013500174.
Повний текст джерелаFoley, Simon N., and Vivien Rooney. "A grounded theory approach to security policy elicitation." Information & Computer Security 26, no. 4 (October 8, 2018): 454–71. http://dx.doi.org/10.1108/ics-12-2017-0086.
Повний текст джерелаWeber, Stefan G., and Prima Gustiené. "Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles." International Journal of Information Systems for Crisis Response and Management 5, no. 2 (April 2013): 1–18. http://dx.doi.org/10.4018/jiscrm.2013040101.
Повний текст джерелаRaspotnig, Christian, Peter Karpati, and Andreas L. Opdahl. "Combined Assessment of Software Safety and Security Requirements." Journal of Cases on Information Technology 20, no. 1 (January 2018): 46–69. http://dx.doi.org/10.4018/jcit.2018010104.
Повний текст джерелаSaikayasit, Rose, Alex W. Stedmon, and Glyn Lawson. "User Requirements Elicitation in Security and Counter-Terrorism: A Human Factors Approach." Journal of Police and Criminal Psychology 28, no. 2 (June 19, 2013): 162–70. http://dx.doi.org/10.1007/s11896-013-9129-7.
Повний текст джерелаArogundade, O. T., A. T. Akinwale, Z. Jin, and X. G. Yang. "A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements." International Journal of Information Security and Privacy 5, no. 4 (October 2011): 8–30. http://dx.doi.org/10.4018/jisp.2011100102.
Повний текст джерелаAndrade, Roberto, Jenny Torres, Iván Ortiz-Garcés, Jorge Miño, and Luis Almeida. "An Exploratory Study Gathering Security Requirements for the Software Development Process." Electronics 12, no. 17 (August 25, 2023): 3594. http://dx.doi.org/10.3390/electronics12173594.
Повний текст джерелаFaily, Shamal. "Engaging stakeholders during late stage security design with assumption personas." Information & Computer Security 23, no. 4 (October 12, 2015): 435–46. http://dx.doi.org/10.1108/ics-10-2014-0066.
Повний текст джерелаZareen, Saima, Adeel Akram, and Shoab Ahmad Khan. "Security Requirements Engineering Framework with BPMN 2.0.2 Extension Model for Development of Information Systems." Applied Sciences 10, no. 14 (July 20, 2020): 4981. http://dx.doi.org/10.3390/app10144981.
Повний текст джерелаKalloniatis, Christos, Costas Lambrinoudakis, Mathias Musahl, Athanasios Kanatas, and Stefanos Gritzalis. "Incorporating privacy by design in body sensor networks for medical applications: A privacy and data protection framework." Computer Science and Information Systems, no. 00 (2020): 57. http://dx.doi.org/10.2298/csis200922057k.
Повний текст джерелаAdee, Rose, and Haralambos Mouratidis. "A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography." Sensors 22, no. 3 (February 1, 2022): 1109. http://dx.doi.org/10.3390/s22031109.
Повний текст джерелаArgyropoulos, Nikolaos, Konstantinos Angelopoulos, Haralambos Mouratidis, and Andrew Fish. "Risk-aware decision support with constrained goal models." Information & Computer Security 26, no. 4 (October 8, 2018): 472–90. http://dx.doi.org/10.1108/ics-01-2018-0010.
Повний текст джерелаTsohou, Aggeliki, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, and Beatriz Gallego-Nicasio Crespo. "Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform." Information & Computer Security 28, no. 4 (April 16, 2020): 531–53. http://dx.doi.org/10.1108/ics-01-2020-0002.
Повний текст джерелаMarques, Johnny, and Adilson Marques da Cunha. "ARES: An Agile Requirements Specification Process for Regulated Environments." International Journal of Software Engineering and Knowledge Engineering 29, no. 10 (October 2019): 1403–38. http://dx.doi.org/10.1142/s021819401950044x.
Повний текст джерелаGhufron, Kharisma Muzaki, Wahyu Andhyka Kusuma, and Fauzan Fauzan. "PENGGUNAAN USER PERSONA UNTUK EVALUASI DAN MENINGKATKAN EKSPEKTASI PENGGUNA DALAM KEBUTUHAN SISTEM INFORMASI AKADEMIK." SINTECH (Science and Information Technology) Journal 3, no. 2 (October 28, 2020): 90–99. http://dx.doi.org/10.31598/sintechjournal.v3i2.587.
Повний текст джерелаCALVANESE, DIEGO, MARCO MONTALI, MARLON DUMAS, and FABRIZIO M. MAGGI. "Semantic DMN: Formalizing and Reasoning About Decisions in the Presence of Background Knowledge." Theory and Practice of Logic Programming 19, no. 04 (January 18, 2019): 536–73. http://dx.doi.org/10.1017/s1471068418000479.
Повний текст джерелаVargas, Cyntia, Jens Bürger, Fabien Viertel, Birgit Vogel-Heuser, and Jan Jürjens. "System evolution through semi-automatic elicitation of security requirements: A Position Paper ⁎ ⁎Research supported by the DFG (German Research Foundation) in Priority Programme SPP1593: Design for Future - Managed Software Evolution (VO 937/20-2 and JU 2734/2-2)." IFAC-PapersOnLine 51, no. 10 (2018): 64–69. http://dx.doi.org/10.1016/j.ifacol.2018.06.238.
Повний текст джерелаMajore, Ginta. "ENTERPRISE MODELLING METHODOLOGY FOR SOCIO-CYBER-PHYSICAL SYSTEMS DESIGN: CASE FROM CYBERSECURITY EDUCATION AND CLIMATE-SMART AGRICULTURE." SOCIETY. TECHNOLOGY. SOLUTIONS. Proceedings of the International Scientific Conference 2 (April 8, 2022): 4. http://dx.doi.org/10.35363/via.sts.2022.74.
Повний текст джерелаMajore, Ginta. "ENTERPRISE MODELLING METHODOLOGY FOR SOCIO-CYBER-PHYSICAL SYSTEMS DESIGN: CASE FROM CYBERSECURITY EDUCATION AND CLIMATE-SMART AGRICULTURE." SOCIETY. TECHNOLOGY. SOLUTIONS. Proceedings of the International Scientific Conference 2 (April 8, 2022): 4. http://dx.doi.org/10.35363/via.sts.2022.74.
Повний текст джерела"Quantitative Analysis of Requirement Elicitation Techniques through FANP: Security Perspective." International Journal of Recent Technology and Engineering 8, no. 5 (January 30, 2020): 3550–58. http://dx.doi.org/10.35940/ijrte.e6402.018520.
Повний текст джерела"Optimizing the Impact of Security Attributes in Requirement Elicitation Techniques using FAHP." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (February 10, 2020): 1656–61. http://dx.doi.org/10.35940/ijitee.d1213.029420.
Повний текст джерела"Detection of Vulnerability Injection Point in Software Development Lifecycle for Effective Countermeasures." International Journal of Engineering and Advanced Technology 9, no. 3 (February 29, 2020): 2715–21. http://dx.doi.org/10.35940/ijeat.c6045.029320.
Повний текст джерелаMatulevičius, Raimundas, and Naved Ahmed. "Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns." it – Information Technology 55, no. 6 (January 1, 2013). http://dx.doi.org/10.1515/itit.2013.2002.
Повний текст джерела"Secure MEReq: A Tool Support to Check for Completeness of Security Requirements." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 768–71. http://dx.doi.org/10.35940/ijrte.b1125.0982s1119.
Повний текст джерелаHibshi, Hanan, Stephanie Jones, and Travis Breaux. "A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements." IEEE Transactions on Dependable and Secure Computing, 2021, 1. http://dx.doi.org/10.1109/tdsc.2021.3103109.
Повний текст джерелаSaleh, Emam, and Fahd ElShahrani. "Extracting Functional and Non-Functional Requirements for E-learning Systems." International Journal of Educational Sciences and Arts 2, no. 5 (2023). http://dx.doi.org/10.59992/ijesa.2023.v2n5p3.
Повний текст джерелаDaun, Marian, Alicia M. Grubb, Viktoria Stenkova, and Bastian Tenbergen. "A systematic literature review of requirements engineering education." Requirements Engineering, May 19, 2022. http://dx.doi.org/10.1007/s00766-022-00381-9.
Повний текст джерелаBagriyanik, Selami, and Adem Karahoca. "Big data in software engineering: A systematic literature review." Global Journal of Information Technology 6, no. 1 (March 15, 2016). http://dx.doi.org/10.18844/gjit.v6i1.397.
Повний текст джерелаTemate-Tiagueu, Yvette, Joseph Amlung, Dennis Stover, Philip Peters, John T. Brooks, Sridhar Papagari Sangareddy, Jina J. Dcruz, and Kamran Ahmed. "Dashboard Prototype for Improved HIV Monitoring and Reporting for Indiana." Online Journal of Public Health Informatics 11, no. 1 (May 30, 2019). http://dx.doi.org/10.5210/ojphi.v11i1.9699.
Повний текст джерела