The state of the art in automated requirements elicitation
H Meth, M Brhel, A Maedche - Information and Software Technology, 2013 - Elsevier
Context In large software development projects a huge number of unstructured text
documents from various stakeholders becomes available and needs to be analyzed and …
documents from various stakeholders becomes available and needs to be analyzed and …
Advances in automated support for requirements engineering: a systematic literature review
Requirements Engineering (RE) has undergone several transitions over the years, from
traditional methods to agile approaches emphasising increased automation. In many …
traditional methods to agile approaches emphasising increased automation. In many …
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
Natural language artifacts, such as requirements specifications, often explicitly state the
security requirements for software systems. However, these artifacts may also imply …
security requirements for software systems. However, these artifacts may also imply …
Supporting privacy impact assessment by model-based privacy analysis
According to Article 35 of the General Data Protection Regulation (GDPR), data controllers
are obligated to conduct a privacy impact assessment (PIA) to ensure the protection of …
are obligated to conduct a privacy impact assessment (PIA) to ensure the protection of …
Transformed vargha-delaney effect size
Researchers without a technical background in statistics may be tempted to apply analytical
techniques in a ritualistic manner. SBSE research is not immune to this problem. We argue …
techniques in a ritualistic manner. SBSE research is not immune to this problem. We argue …
Requirements document relations: A reuse perspective on traceability through standards
Relations between requirements are part of nearly every requirements engineering
approach. Yet, relations of views, such as requirements documents, are scarcely …
approach. Yet, relations of views, such as requirements documents, are scarcely …
A framework for semi-automated co-evolution of security knowledge and system models
J Bürger, D Strüber, S Gärtner, T Ruhroth… - Journal of Systems and …, 2018 - Elsevier
Security is an important and challenging quality aspect of software-intensive systems,
becoming even more demanding regarding long-living systems. Novel attacks and changing …
becoming even more demanding regarding long-living systems. Novel attacks and changing …
[PDF][PDF] A review on factors influencing implementation of secure software development practices
SL Kanniah, MN Mahrin - International Journal of Computer and …, 2016 - academia.edu
More and more businesses and services are depending on software to run their daily
operations and business services. At the same time, cyber-attacNs are becoming more …
operations and business services. At the same time, cyber-attacNs are becoming more …
Model-based privacy and security analysis with CARiSMA
We present CARiSMA, a tool that is originally designed to support model-based security
analysis of IT systems. In our recent work, we added several new functionalities to CARiSMA …
analysis of IT systems. In our recent work, we added several new functionalities to CARiSMA …
Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements
Considering the dramatic impact of the current technology changes on user privacy, it is
important to contemplate privacy early on in software development. Ensuring privacy is …
important to contemplate privacy early on in software development. Ensuring privacy is …