共 50 条
- [31] Requirements elicitation with indirect knowledge elicitation techniques: Comparison of three methods PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, 1996, : 4 - 11
- [32] Spam Review Detection Techniques: A Systematic Literature Review APPLIED SCIENCES-BASEL, 2019, 9 (05):
- [33] Phishing Classification Techniques: A Systematic Literature Review IEEE Access, 2022, 10 : 41574 - 41591
- [34] Phishing Classification Techniques: A Systematic Literature Review IEEE ACCESS, 2022, 10 : 41574 - 41591
- [35] A Systematic Study on Software Requirements Elicitation Techniques and Its Challenges in Mobile Application Development IEEE ACCESS, 2018, 6 : 63859 - 63867
- [37] Framework for matching requirements elicitation techniques to project characteristics Software Process Improvement and Practice, 2006, 11 (05): : 505 - 519
- [38] Requirements Elicitation Techniques and Tools in the Context of Artificial Intelligence INTELLIGENT SYSTEMS, PT I, 2022, 13653 : 15 - 29
- [39] A review of Requirement Elicitation techniques in OSSD INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (03): : 86 - 92
- [40] Intelligent Requirements Elicitation and Modeling: A Literature Review Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (04): : 683 - 705