找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Requirements Engineering for Internet of Things; 4th Asia-Pacific Sym Massila Kamalrudin,Sabrina Ahmad,Naveed Ikram Conference proceedings

[复制链接]
楼主: introspective
发表于 2025-3-25 07:25:01 | 显示全部楼层
发表于 2025-3-25 09:23:10 | 显示全部楼层
Crowd Vigilantend analysis of data from the same crowdsourced project where the threat is situated. The proposed framework aims to improve the security of the crowdsourced projects and their outcomes by building confidence about the trustworthiness of the workers.
发表于 2025-3-25 14:39:50 | 显示全部楼层
发表于 2025-3-25 19:25:37 | 显示全部楼层
Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats social engineering attacks, and make it possible to obtain appropriate security requirements by modeling the relationships among human vulnerability, social engineering attacks and security requirements.
发表于 2025-3-25 20:57:04 | 显示全部楼层
发表于 2025-3-26 00:49:15 | 显示全部楼层
An Empirical Study of the Software Development Process, Including Its Requirements Engineering, at Vfic areas of the development process, particularly its requirements engineering, to improve the likelihood of success for future projects..While describing the results of the empirical study, the paper also shows how such a study can be conducted even when the mined data are not very detailed.
发表于 2025-3-26 04:47:16 | 显示全部楼层
Eliciting Requirements for Improving Users’ Behavior Using Transparency no one can directly manipulate users but transparency has an influence on users’ behavior. We expect users will voluntarily behave better than ever when the system provides suitable information flows. We represent our method by using KAOS goal modeling notation, and show examples how it works.
发表于 2025-3-26 10:38:21 | 显示全部楼层
发表于 2025-3-26 14:05:25 | 显示全部楼层
Challenges in Context-Aware Requirements Modeling: A Systematic Literature Reviewudies and extract available data aimed at the objectives. Seventy-two studies are finally selected. After data synthesis, we identify 4 categories of 13 challenges in context-aware requirements modeling. Based on the findings, we analyze the extent to which the challenges have been addressed and suggest future research directions.
发表于 2025-3-26 17:32:17 | 显示全部楼层
Constructing a Goal Model from Requirements Descriptions Based on Extraction Rulesm the goals. To evaluate our process, we applied the process to two system descriptions to construct goal models. The results show that the proposed process extracted appropriate goals and successfully assembled these goals in a goal hierarchy. We also report preliminary results of automating the proposed process.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-19 05:20
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表