共 50 条
- [21] Security Requirements Analysis for the IoT 2017 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2017, : 305 - 310
- [23] Automated Software Architecture Security Risk Analysis using Formalized Signatures PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 662 - 671
- [24] Information Security Investments: How to Prioritize? A qualitative analysis of the most relevant topics in Information Security Risk Assessments PROCEEDINGS OF THE 20TH BRAZILIAN SYMPOSIUM ON INFORMATIONS SYSTEMS, SBSI 2024, 2024,
- [26] Automated Support to Capture and Validate Security Requirements for Mobile Apps REQUIREMENTS ENGINEERING TOWARD SUSTAINABLE WORLD, 2016, 671 : 97 - 112
- [27] Threat- and Risk-Analysis During Early Security Requirements Engineering FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 188 - 195
- [28] VeriDevOps: Automated Protection and Prevention to Meet Security Requirements in DevOps PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1330 - 1333
- [29] Analysis and evaluation of the communication requirements for remote operating an automated bus in rural areas 2021 IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE (ITSC), 2021, : 693 - 698
- [30] Using Security and Domain ontologies for Security Requirements Analysis 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 101 - 107