Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] System security assurance: A systematic literature review
Abstract System security assurance provides the confidence that security features, practices,
procedures, and architecture of software systems mediate and enforce the security policy …
procedures, and architecture of software systems mediate and enforce the security policy …
Machine learning in requirements elicitation: A literature review
A growing trend in requirements elicitation is the use of machine learning (ML) techniques to
automate the cumbersome requirement handling process. This literature review summarizes …
automate the cumbersome requirement handling process. This literature review summarizes …
Describing objects by their attributes
We propose to shift the goal of recognition from naming to describing. Doing so allows us
not only to name familiar objects, but also: to report unusual aspects of a familiar object …
not only to name familiar objects, but also: to report unusual aspects of a familiar object …
A serious game for eliciting social engineering security requirements
Social engineering is the acquisition of information about computer systems by methods that
deeply include nontechnical means. While technical security of most critical systems is high …
deeply include nontechnical means. While technical security of most critical systems is high …
A framework to support selection of cloud providers based on security and privacy requirements
Cloud computing is an evolving paradigm that is radically changing the way humans store,
share and access their digital files. Despite the many benefits, such as the introduction of a …
share and access their digital files. Despite the many benefits, such as the introduction of a …
Automated, interactive, and traceable domain modelling empowered by artificial intelligence
Abstract Model-Based Software Engineering provides various modelling formalisms for
capturing the structural, behavioral, configuration, and intentional aspects of software …
capturing the structural, behavioral, configuration, and intentional aspects of software …
Defining security requirements with the common criteria: Applications, adoptions, and challenges
Advances in emerging Information and Communications Technology (ICT) technologies
push the boundaries of what is possible and open up new markets for innovative ICT …
push the boundaries of what is possible and open up new markets for innovative ICT …
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
One of the major research challenges for the successful deployment of cloud services is a
clear understanding of security and privacy issues on a cloud environment, since cloud …
clear understanding of security and privacy issues on a cloud environment, since cloud …
Re data challenge: Requirements identification with word2vec and tensorflow
A Dekhtyar, V Fong - 2017 IEEE 25th international …, 2017 - ieeexplore.ieee.org
Since their introduction over a year ago, Google's TensorFlow package for learning with
multilayer neural networks and their Word2Vec representation of words have both gained a …
multilayer neural networks and their Word2Vec representation of words have both gained a …
Secure business process model specification through a UML 2.0 activity diagram profile
Business processes have become important resources, both for an enterprise's performance
and to enable it to maintain its competitiveness. The languages used for business process …
and to enable it to maintain its competitiveness. The languages used for business process …