共 50 条
- [5] Eliciting Security Requirements - An Experience Report REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2023, 2023, 13975 : 351 - 365
- [6] Eliciting security requirements by misuse cases 37TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 120 - 143
- [7] Modeling and Utilizing Security Knowledge for Eliciting Security Requirements ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 236 - 247
- [8] Eliciting security requirements through misuse activities DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, : 328 - +
- [9] Eliciting Usable Security Requirements with Misusability Cases 2011 19TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2011, : 339 - 340
- [10] Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 225 - 230