-
1
-
-
79953067803
-
-
International Standardization Organization Revision 2, CCMB-2007-09-001, CCMB- 2007-09-002 and CCMB-2007-09-003 September
-
International Standardization Organization. ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, CCMB-2007-09-001, CCMB- 2007-09-002 and CCMB-2007-09-003 (September 2007)
-
(2007)
ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1
-
-
-
2
-
-
77950516884
-
Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
-
Houmb, S.H., Islam, S., Knauss, E., Jürens, J., Schneider, K.: Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec. Requirements Engineering Journal 15(1), 63-93 (2010)
-
(2010)
Requirements Engineering Journal
, vol.15
, Issue.1
, pp. 63-93
-
-
Houmb, S.H.1
Islam, S.2
Knauss, E.3
Jürens, J.4
Schneider, K.5
-
3
-
-
73549109532
-
Feedback-driven requirements engineering: The heuristic requirements assistant
-
Vancouver, Canada
-
Knauss, E., Lübke, D., Meyer, S.: Feedback-Driven Requirements Engineering: The Heuristic Requirements Assistant. In: International Conference on Software Engineering (ICSE 2009), Formal Research Demonstrations Track, Vancouver, Canada, pp. 587-590 (2009)
-
(2009)
International Conference on Software Engineering (ICSE 2009), Formal Research Demonstrations Track
, pp. 587-590
-
-
Knauss, E.1
Lübke, D.2
Meyer, S.3
-
5
-
-
64849090022
-
Beyond documents: Visualizing informal communication
-
Barcelona, Spain
-
Schneider, K., Stapel, K., Knauss, E.: Beyond Documents: Visualizing Informal Communication. In: Proceedings of Third International Workshop on Requirements Engineering Visualization (REV 2008), Barcelona, Spain (2008)
-
(2008)
Proceedings of Third International Workshop on Requirements Engineering Visualization (REV 2008)
-
-
Schneider, K.1
Stapel, K.2
Knauss, E.3
-
6
-
-
33947368645
-
Model-based security analysis in seven steps - A guided tour to the CORAS method
-
DOI 10.1007/s10550-007-0013-9
-
den Braber, F., Hogganvik, I., Lund, M., Stølen, K., Vraalsen, F.: Model-based security analysis in seven steps - a guided tour to the CORAS method. BT Technology Journal 25(1), 101-117 (2007) (Pubitemid 46455705)
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 101-117
-
-
Den Braber, F.1
Hogganvik, I.2
Lund, M.S.3
Stolen, K.4
Vraalsen, F.5
-
7
-
-
0001094070
-
The use of the CCTA risk-analysis and management methodology [CRAMM] in health information systems
-
Degoulet, P., Lun, K., Piemme, T., Rienhoff, O. (eds.) Elsevier, North-Holland
-
Barber, B., Davey, J.: The use of the CCTA risk-analysis and management methodology [CRAMM] in health information systems. In: Degoulet, P., Lun, K., Piemme, T., Rienhoff, O. (eds.) MEDINFO 1992, pp. 1589-1593. Elsevier, North-Holland (1992)
-
(1992)
MEDINFO 1992
, pp. 1589-1593
-
-
Barber, B.1
Davey, J.2
-
9
-
-
41149177720
-
Identifying nocuous ambiguities in natural language requirements
-
DOI 10.1109/RE.2006.31, 1704049, Proceedings - 14th IEEE International Requirements Engineering Conference, RE'06
-
Chantree, F., Nuseibeh, B., de Roeck, A., Willis, A.: Identifying Nocuous Ambiguities in Natural Language Requirements. In: Proceedings of the 14th IEEE International Requirements Engineering Conference, Minneapolis, USA, pp. 56-65. IEEE Computer Society, Los Alamitos (2006) (Pubitemid 351424200)
-
(2006)
Proceedings of the IEEE International Conference on Requirements Engineering
, pp. 56-65
-
-
Chantree, F.1
Nuseibeh, B.2
De Roeck, A.3
Willis, A.4
-
10
-
-
50949131690
-
Requirements for tools for ambiguity identification and measurement in natural language requirements specifications
-
Kiyavitskaya, N., Zeni, N., Mich, L., Berry, D.M.: Requirements for tools for ambiguity identification and measurement in natural language requirements specifications. Requirements Engineering Journal 13(3), 207-239 (2008)
-
(2008)
Requirements Engineering Journal
, vol.13
, Issue.3
, pp. 207-239
-
-
Kiyavitskaya, N.1
Zeni, N.2
Mich, L.3
Berry, D.M.4
-
11
-
-
3242783893
-
-
Web (January 2011)
-
Graham, P.: A Plan for Spam (2002) Web (January 2011), http://www.paulgraham.com/spam.html
-
(2002)
A Plan for Spam
-
-
Graham, P.1
-
12
-
-
1942484786
-
Tackling the poor assumptions of naive bayes text classifiers
-
Washington, DC
-
Rennie, J.D.M., Shih, L., Teevan, J., Karger, D.R.: Tackling the Poor Assumptions of Naive Bayes Text Classifiers. In: Proceedings of the Twentieth International Conference on Machine Learning (ICML 2003), Washington, DC (2003)
-
(2003)
Proceedings of the Twentieth International Conference on Machine Learning (ICML 2003)
-
-
Rennie, J.D.M.1
Shih, L.2
Teevan, J.3
Karger, D.R.4
-
14
-
-
31744452336
-
Evaluating machine learning for information extraction
-
DOI 10.1145/1102351.1102395, ICML 2005 - Proceedings of the 22nd International Conference on Machine Learning
-
Ireson, N., Ciravegna, F., Califf, M.E., Freitag, D., Kushmerick, N., Lavelli, A.: Evaluating machine learning for information extraction. In: ICML 2005: Proceedings of the 22nd International Conference on Machine Learning, Bonn, Germany, pp. 345-352. ACM, New York (2005) (Pubitemid 43183352)
-
(2005)
ICML 2005 - Proceedings of the 22nd International Conference on Machine Learning
, pp. 345-352
-
-
Ireson, N.1
Ciravegna, F.2
Califf, M.E.3
Freitag, D.4
Kushmerick, N.5
Laveli, A.6
-
15
-
-
0003932630
-
-
M. Kaufmann Publishers, San Mateo
-
Weiss, S.M., Kulikowski, C.A.: Computer systems that learn: classification and prediction methods from statistics, neural nets, machine learning, and expert systems. M. Kaufmann Publishers, San Mateo (1991)
-
(1991)
Computer Systems that Learn: Classification and Prediction Methods from Statistics, Neural Nets, Machine Learning, and Expert Systems
-
-
Weiss, S.M.1
Kulikowski, C.A.2
-
18
-
-
79953109717
-
TISPAN, ETSI: Telecommunications and internet converged services and protocols for advanced networking (TISPAN); services requirements and capabilities for customer networks connected to TISPAN NGN
-
TISPAN, ETSI: Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Services requirements and capabilities for customer networks connected to TISPAN NGN. Technical report, European Telecommunications Standards Institute
-
Technical Report, European Telecommunications Standards Institute
-
-
-
20
-
-
0003639957
-
-
Kluwer Academic Publishers, Boston
-
Wohlin, C., Runeson, P., Höst, M., Ohlsson, M.C., Regnell, B., Wesslén, A.: Experimentation In Software Engineering: An Introduction. Kluwer Academic Publishers, Boston (2000)
-
(2000)
Experimentation in Software Engineering: An Introduction
-
-
Wohlin, C.1
Runeson, P.2
Höst, M.3
Ohlsson, M.C.4
Regnell, B.5
Wesslén, A.6
-
21
-
-
84979855000
-
Dealing with security requirements during the development of information systems
-
Rolland, C., Cauvet, C., Bodart, F. (eds.) LNCS Springer, Heidelberg
-
Chung, L.: Dealing with Security Requirements During the Development of Information Systems. In: Rolland, C., Cauvet, C., Bodart, F. (eds.) CAiSE 1993. LNCS, vol. 685, pp. 234-251. Springer, Heidelberg (1993)
-
(1993)
CAiSE 1993
, vol.685
, pp. 234-251
-
-
Chung, L.1
-
22
-
-
0007423745
-
A framework for dealing with and specifying security requirements in information systems
-
Katsikas, S.K., Gritzalis, D. (eds.) Chapman & Hall, Boca Raton
-
Dubois, E., Wu, S.: A framework for dealing with and specifying security requirements in information systems. In: Katsikas, S.K., Gritzalis, D. (eds.) SEC. IFIP Conference Proceedings, vol. 54, pp. 88-99. Chapman & Hall, Boca Raton (1996)
-
(1996)
SEC. IFIP Conference Proceedings
, vol.54
, pp. 88-99
-
-
Dubois, E.1
Wu, S.2
-
23
-
-
84942929509
-
Introducing abuse frames for analysing security requirements
-
IEEE Computer Society, Los Alamitos
-
Lin, L., Nuseibeh, B., Ince, D.C., Jackson, M., Moffett, J.D.: Introducing Abuse Frames for Analysing Security Requirements. In: RE, pp. 371-372. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
RE
, pp. 371-372
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.C.3
Jackson, M.4
Moffett, J.D.5
-
24
-
-
0142156745
-
Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and mastercard
-
Song, I.-Y., Liddle, S.W., Ling, T.-W., Scheuermann, P. (eds.) LNCS Springer, Heidelberg
-
Giorgini, P., Massacci, F., Mylopoulos, J.: Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and mastercard. In: Song, I.-Y., Liddle, S.W., Ling, T.-W., Scheuermann, P. (eds.) ER 2003. LNCS, vol. 2813, pp. 263-276. Springer, Heidelberg (2003)
-
(2003)
ER 2003
, vol.2813
, pp. 263-276
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
25
-
-
40449092394
-
Applying formal methods to a certifiably secure software system
-
DOI 10.1109/TSE.2007.70772
-
Heitmeyer, C.L., Archer, M., Leonard, E.I., McLean, J.: Applying Formal Methods to a Certifiably Secure Software System. IEEE Trans. Software Eng. 34(1), 82-98 (2008) (Pubitemid 351343904)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 82-98
-
-
Heitmeyer, C.L.1
Archer, M.M.2
Leonard, E.I.3
McLean, J.D.4
-
28
-
-
33845292826
-
Building decision support problem domain ontology from natural language requirements for software assurance
-
DOI 10.1142/S0218194006003051, PII S0218194006003051
-
Lee, S.W., Muthurajan, D., Gandhi, R.A., Yavagal, D.S., Ahn, G.J.: Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance. International Journal of Software Engineering and Knowledge Engineering 16(6), 851-884 (2006) (Pubitemid 46181435)
-
(2006)
International Journal of Software Engineering and Knowledge Engineering
, vol.16
, Issue.6
, pp. 851-884
-
-
Lee, S.-W.1
Muthurajan, D.2
Gandhi, R.A.3
Yavagal, D.4
Ahn, G.-J.5
-
29
-
-
57049148008
-
Automating the extraction of rights and obligations for regulatory compliance
-
Li, Q., Spaccapietra, S., Yu, E., Olivé, A. (eds.) LNCS Springer, Heidelberg
-
Kiyavitskaya, N., Zeni, N., Breaux, T.D., Antón, A.I., Cordy, J.R., Mich, L., Mylopoulos, J.: Automating the extraction of rights and obligations for regulatory compliance. In: Li, Q., Spaccapietra, S., Yu, E., Olivé, A. (eds.) ER 2008. LNCS, vol. 5231, pp. 154-168. Springer, Heidelberg (2008)
-
(2008)
ER 2008
, vol.5231
, pp. 154-168
-
-
Kiyavitskaya, N.1
Zeni, N.2
Breaux, T.D.3
Antón, A.I.4
Cordy, J.R.5
Mich, L.6
Mylopoulos, J.7
|