Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Survey of cyber risk analysis techniques for use in the nuclear industry
S Eggers, K Le Blanc - Progress in Nuclear Energy, 2021 - Elsevier
Using traditional probabilistic risk analysis methods for severe accident safety risk
management on non-digital systems, structures, and components at nuclear power plants is …
management on non-digital systems, structures, and components at nuclear power plants is …
Automatic requirements engineering: Activities, methods, tools, and domains–a systematic literature review
Requirements engineering (RE) is an initial activity in the software engineering process that
involves many users. The involvement of various users in the RE process raises ambiguity …
involves many users. The involvement of various users in the RE process raises ambiguity …
[PDF][PDF] CVSS-based Estimation and Prioritization for Security Risks.
R Wirtz, M Heisel - ENASE, 2019 - scitepress.org
During software development, it is of essential importance to consider security threats. The
number of reported incidents and the harm for organizations due to such incidents highly …
number of reported incidents and the harm for organizations due to such incidents highly …
Top Management and Organizational Support for Information Security as Perceived by US Healthcare Employees: A Quantitative Study
V Anderson - 2022 - search.proquest.com
The purpose of this study was to explore the extent to which top management commitment to
information security compliance predicts organizational support as perceived by the …
information security compliance predicts organizational support as perceived by the …
Model-based risk analysis and evaluation using CORAS and CVSS
R Wirtz, M Heisel - Evaluation of Novel Approaches to Software …, 2020 - Springer
The consideration of security during software development is an important factor for
deploying high-quality software. The later one considers security in a software development …
deploying high-quality software. The later one considers security in a software development …
Optimization Modulo Theories with OptiMathSAT
P Trentin - 2019 - eprints-phd.biblio.unitn.it
In the contexts of Formal Verification (FV) and Automated Reasoning (AR), Satisfiability
Modulo Theories (SMT) is an important discipline that allows for dealing with industrial-level …
Modulo Theories (SMT) is an important discipline that allows for dealing with industrial-level …
Implementation and Design of Secure Business Process Models Based on Organisational Goals
A Patrick - 2022 - researchsquare.com
Business processes are essential instruments used for the coordination of organisational
activities in order to produce value in the form of products and services. Information security …
activities in order to produce value in the form of products and services. Information security …
[PDF][PDF] Designing secure business processes from organisational goal models
N Argyropoulos - 2018 - core.ac.uk
Business processes are essential instruments used for the coordination of organisational
activities in order to produce value in the form of products and services. Information security …
activities in order to produce value in the form of products and services. Information security …
[PDF][PDF] Managing Security Risks During Requirements Engineering
R Wirtz - 2021 - d-nb.info
Due to the ongoing digitalization of our everyday life, the consideration of security for
software-intensive systems is of great importance. The number of reported security incidents …
software-intensive systems is of great importance. The number of reported security incidents …