导师 发表于 2025-3-25 07:25:01

http://reply.papertrans.cn/83/8277/827663/827663_21.png

Ornament 发表于 2025-3-25 09:23:10

Crowd Vigilantend analysis of data from the same crowdsourced project where the threat is situated. The proposed framework aims to improve the security of the crowdsourced projects and their outcomes by building confidence about the trustworthiness of the workers.

高度 发表于 2025-3-25 14:39:50

http://reply.papertrans.cn/83/8277/827663/827663_23.png

Prostaglandins 发表于 2025-3-25 19:25:37

Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats social engineering attacks, and make it possible to obtain appropriate security requirements by modeling the relationships among human vulnerability, social engineering attacks and security requirements.

胰脏 发表于 2025-3-25 20:57:04

http://reply.papertrans.cn/83/8277/827663/827663_25.png

警告 发表于 2025-3-26 00:49:15

An Empirical Study of the Software Development Process, Including Its Requirements Engineering, at Vfic areas of the development process, particularly its requirements engineering, to improve the likelihood of success for future projects..While describing the results of the empirical study, the paper also shows how such a study can be conducted even when the mined data are not very detailed.

encyclopedia 发表于 2025-3-26 04:47:16

Eliciting Requirements for Improving Users’ Behavior Using Transparency no one can directly manipulate users but transparency has an influence on users’ behavior. We expect users will voluntarily behave better than ever when the system provides suitable information flows. We represent our method by using KAOS goal modeling notation, and show examples how it works.

无礼回复 发表于 2025-3-26 10:38:21

http://reply.papertrans.cn/83/8277/827663/827663_28.png

obscurity 发表于 2025-3-26 14:05:25

Challenges in Context-Aware Requirements Modeling: A Systematic Literature Reviewudies and extract available data aimed at the objectives. Seventy-two studies are finally selected. After data synthesis, we identify 4 categories of 13 challenges in context-aware requirements modeling. Based on the findings, we analyze the extent to which the challenges have been addressed and suggest future research directions.

craving 发表于 2025-3-26 17:32:17

Constructing a Goal Model from Requirements Descriptions Based on Extraction Rulesm the goals. To evaluate our process, we applied the process to two system descriptions to construct goal models. The results show that the proposed process extracted appropriate goals and successfully assembled these goals in a goal hierarchy. We also report preliminary results of automating the proposed process.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Requirements Engineering for Internet of Things; 4th Asia-Pacific Sym Massila Kamalrudin,Sabrina Ahmad,Naveed Ikram Conference proceedings