Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comparison of security requirements engineering methods
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …
security requirements elicitation and analysis. This conceptual framework establishes a …
[PDF][PDF] Approaches to develop and implement iso/iec 27001 standard-information security management systems: A systematic literature review
This systematic literature review intends to determine the extent to which contribution is
available to assist organisations and interested parties to understand better or comply with …
available to assist organisations and interested parties to understand better or comply with …
[HTML][HTML] Modeling security and privacy requirements: a use case-driven approach
Context: Modern internet-based services, ranging from food-delivery to home-caring,
leverage the availability of multiple programmable devices to provide handy services …
leverage the availability of multiple programmable devices to provide handy services …
Agile development with security engineering activities
D Baca, B Carlsson - Proceedings of the 2011 international conference …, 2011 - dl.acm.org
Agile software development has been used by industry to create a more flexible and lean
software development process, ie making it possible to develop software at a faster rate and …
software development process, ie making it possible to develop software at a faster rate and …
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system
Established standards on security and risk management provide guidelines and advice to
organizations and other stakeholders on how to fulfill their security needs. However …
organizations and other stakeholders on how to fulfill their security needs. However …
Identification and evaluation of security activities in agile projects
T Ayalew, T Kidane, B Carlsson - … 2013, Ilulissat, Greenland, October 18-21 …, 2013 - Springer
We compare four high-profile waterfall security-engineering processes (CLASP, Microsoft
SDL, Cigital Touchpoints and Common Criteria) with the available preconditions within agile …
SDL, Cigital Touchpoints and Common Criteria) with the available preconditions within agile …
[PDF][PDF] Agile security-review of current research and pilot usage
C Woody - SEI White Paper, 2013 - resources.sei.cmu.edu
This paper was produced to focus attention on the opportunities and challenges for
embedding information assurance (IA) considerations into Agile development and …
embedding information assurance (IA) considerations into Agile development and …
A problem-based threat analysis in compliance with common criteria
K Beckers, D Hatebur, M Heisel - … International Conference on …, 2013 - ieeexplore.ieee.org
In order to gain their customers' trust, software vendors can certify their products according to
security standards, eg, the Common Criteria (ISO 15408). A Common Criteria certification …
security standards, eg, the Common Criteria (ISO 15408). A Common Criteria certification …
A data set for quantitative motion analysis
Software product line engineering has proven to be one of the most successful paradigms
for develo** a diversity of similar software applications and software-intensive systems at …
for develo** a diversity of similar software applications and software-intensive systems at …
Fuzzy logic driven security requirements engineering process
Security requirements are non-functional requirements which are employed to protect the
information from unauthorized users. After the requirements elicitation process, a system …
information from unauthorized users. After the requirements elicitation process, a system …