Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements
Data protection compliance is critical from a requirements engineering (RE) perspective,
both from a software development lifecycle (SDLC) perspective and regulatory compliance …
both from a software development lifecycle (SDLC) perspective and regulatory compliance …
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)
Context: Security, in digitally connected organizational environments of today, involves
many different perspectives, including social, physical, and technical factors. In order to …
many different perspectives, including social, physical, and technical factors. In order to …
Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system
R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …
available on multiple sources, including social media. The information could be used to …
[HTML][HTML] Building knowledge graphs from unstructured texts: Applications and impact analyses in cybersecurity education
Knowledge graphs gained popularity in recent years and have been useful for concept
visualization and contextual information retrieval in various applications. However …
visualization and contextual information retrieval in various applications. However …
Advanced Persistent Threat intelligent profiling technique: A survey
BH Tang, JF Wang, Z Yu, B Chen, W Ge, J Yu… - Computers and Electrical …, 2022 - Elsevier
With the boom in Internet and information technology, cyber-attacks are becoming more
frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike …
frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike …
Improving software security awareness using a serious game
Protecting people from cyber threats imposes great challenges, not only technically, but also
socially. To achieve the intended level of awareness, software security principles need to be …
socially. To achieve the intended level of awareness, software security principles need to be …
An ontology-based security risk management model for information systems
Security risk management is a knowledge-intensive procedure that requires monitoring and
capturing relevant information that can assist in making the right decision by managers. In …
capturing relevant information that can assist in making the right decision by managers. In …
Reusable knowledge in security requirements engineering: a systematic map** study
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …
system development. Over the last two decades, researchers and engineers have …
A STAMP-based ontology approach to support safety and security analyses
Considerations of safety and security in the early stage of system life cycle are essential to
collect and prioritize operation needs, determine feasibility of the desired system, and …
collect and prioritize operation needs, determine feasibility of the desired system, and …
COPri v. 2—A core ontology for privacy requirements
Nowadays, most enterprises collect, store, and manage personal information of customers to
deliver their services. In such a setting, privacy has emerged as a key concern since …
deliver their services. In such a setting, privacy has emerged as a key concern since …