[HTML][HTML] System security assurance: A systematic literature review

A Shukla, B Katt, LO Nweke, PK Yeng… - Computer Science …, 2022 - Elsevier
Abstract System security assurance provides the confidence that security features, practices,
procedures, and architecture of software systems mediate and enforce the security policy …

Machine learning in requirements elicitation: A literature review

C Cheligeer, J Huang, G Wu, N Bhuiyan, Y Xu, Y Zeng - AI EDAM, 2022 - cambridge.org
A growing trend in requirements elicitation is the use of machine learning (ML) techniques to
automate the cumbersome requirement handling process. This literature review summarizes …

Describing objects by their attributes

A Farhadi, I Endres, D Hoiem… - 2009 IEEE conference on …, 2009 - ieeexplore.ieee.org
We propose to shift the goal of recognition from naming to describing. Doing so allows us
not only to name familiar objects, but also: to report unusual aspects of a familiar object …

A serious game for eliciting social engineering security requirements

K Beckers, S Pape - 2016 IEEE 24th International …, 2016 - ieeexplore.ieee.org
Social engineering is the acquisition of information about computer systems by methods that
deeply include nontechnical means. While technical security of most critical systems is high …

A framework to support selection of cloud providers based on security and privacy requirements

H Mouratidis, S Islam, C Kalloniatis… - Journal of Systems and …, 2013 - Elsevier
Cloud computing is an evolving paradigm that is radically changing the way humans store,
share and access their digital files. Despite the many benefits, such as the introduction of a …

Automated, interactive, and traceable domain modelling empowered by artificial intelligence

R Saini, G Mussbacher, JLC Guo, J Kienzle - Software and Systems …, 2022 - Springer
Abstract Model-Based Software Engineering provides various modelling formalisms for
capturing the structural, behavioral, configuration, and intentional aspects of software …

Defining security requirements with the common criteria: Applications, adoptions, and challenges

N Sun, CT Li, H Chan, BD Le, MZ Islam… - IEEE …, 2022 - ieeexplore.ieee.org
Advances in emerging Information and Communications Technology (ICT) technologies
push the boundaries of what is possible and open up new markets for innovative ICT …

Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts

C Kalloniatis, H Mouratidis, M Vassilis, S Islam… - Computer Standards & …, 2014 - Elsevier
One of the major research challenges for the successful deployment of cloud services is a
clear understanding of security and privacy issues on a cloud environment, since cloud …

Re data challenge: Requirements identification with word2vec and tensorflow

A Dekhtyar, V Fong - 2017 IEEE 25th international …, 2017 - ieeexplore.ieee.org
Since their introduction over a year ago, Google's TensorFlow package for learning with
multilayer neural networks and their Word2Vec representation of words have both gained a …

Secure business process model specification through a UML 2.0 activity diagram profile

A Rodríguez, E Fernández-Medina, J Trujillo… - Decision Support …, 2011 - Elsevier
Business processes have become important resources, both for an enterprise's performance
and to enable it to maintain its competitiveness. The languages used for business process …