共 50 条
- [42] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities Requirements Engineering, 2010, 15 : 41 - 62
- [43] Improving the Quality of Requirements in Middleware Requirements Specifications 2020 28TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE'20), 2020, : 412 - 415
- [45] Security on MASS with XML security specifications SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, : 5 - +
- [46] Security protocols and specifications FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, 1999, 1578 : 1 - 13
- [47] Enforcing security in smart homes using security patterns International Journal of Smart Home, 2009, 3 (02): : 57 - 70
- [49] A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 475 - 480
- [50] Bayesian Mechanisms and Learning for Wireless Networks Security with QoS Requirements 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7180 - 7185