共 50 条
- [31] Security Requirements Elicitation from Business Processes BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202
- [32] Users requirements elicitation in the Lyee Software factory 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVIII, PROCEEDINGS: INFORMATION SYSTEMS, CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS, 2002, : 79 - 84
- [33] Existing Vulnerability Information in Security Requirements Elicitation 2022 IEEE 30TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2022, : 220 - 225
- [35] Integration of Software Architecture in Requirements Elicitation for Rapid Software Development IEEE ACCESS, 2022, 10 : 56158 - 56178
- [36] ENTERPRISE KNOWLEDGE BASED SOFTWARE REQUIREMENTS ELICITATION INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (03): : 181 - 190
- [37] Requirements Elicitation Techniques Applied in Software Startups 2017 43RD EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA), 2017, : 141 - 144
- [38] Patient Safety-Focused Medication Therapy Management: Challenges Affecting Future Implementation AMERICAN JOURNAL OF MANAGED CARE, 2012, 18 (07): : E238 - E242
- [40] Security requirements for software development KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 116 - 122