找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Requirements Engineering for Internet of Things; 4th Asia-Pacific Sym Massila Kamalrudin,Sabrina Ahmad,Naveed Ikram Conference proceedings

[復(fù)制鏈接]
樓主: introspective
21#
發(fā)表于 2025-3-25 07:25:01 | 只看該作者
22#
發(fā)表于 2025-3-25 09:23:10 | 只看該作者
Crowd Vigilantend analysis of data from the same crowdsourced project where the threat is situated. The proposed framework aims to improve the security of the crowdsourced projects and their outcomes by building confidence about the trustworthiness of the workers.
23#
發(fā)表于 2025-3-25 14:39:50 | 只看該作者
24#
發(fā)表于 2025-3-25 19:25:37 | 只看該作者
Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats social engineering attacks, and make it possible to obtain appropriate security requirements by modeling the relationships among human vulnerability, social engineering attacks and security requirements.
25#
發(fā)表于 2025-3-25 20:57:04 | 只看該作者
26#
發(fā)表于 2025-3-26 00:49:15 | 只看該作者
An Empirical Study of the Software Development Process, Including Its Requirements Engineering, at Vfic areas of the development process, particularly its requirements engineering, to improve the likelihood of success for future projects..While describing the results of the empirical study, the paper also shows how such a study can be conducted even when the mined data are not very detailed.
27#
發(fā)表于 2025-3-26 04:47:16 | 只看該作者
Eliciting Requirements for Improving Users’ Behavior Using Transparency no one can directly manipulate users but transparency has an influence on users’ behavior. We expect users will voluntarily behave better than ever when the system provides suitable information flows. We represent our method by using KAOS goal modeling notation, and show examples how it works.
28#
發(fā)表于 2025-3-26 10:38:21 | 只看該作者
29#
發(fā)表于 2025-3-26 14:05:25 | 只看該作者
Challenges in Context-Aware Requirements Modeling: A Systematic Literature Reviewudies and extract available data aimed at the objectives. Seventy-two studies are finally selected. After data synthesis, we identify 4 categories of 13 challenges in context-aware requirements modeling. Based on the findings, we analyze the extent to which the challenges have been addressed and suggest future research directions.
30#
發(fā)表于 2025-3-26 17:32:17 | 只看該作者
Constructing a Goal Model from Requirements Descriptions Based on Extraction Rulesm the goals. To evaluate our process, we applied the process to two system descriptions to construct goal models. The results show that the proposed process extracted appropriate goals and successfully assembled these goals in a goal hierarchy. We also report preliminary results of automating the proposed process.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-19 00:57
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
庆阳市| 驻马店市| 长沙市| 会宁县| 辽中县| 泌阳县| 隆化县| 板桥市| 桓仁| 仪陇县| 清丰县| 辽中县| 双流县| 资溪县| 外汇| 南召县| 中牟县| 长白| 顺义区| 贵阳市| 游戏| 方城县| 罗平县| 沁源县| 富顺县| 乐亭县| 平阳县| 凤庆县| 昭苏县| 和林格尔县| 武宁县| 扶绥县| 噶尔县| 湟中县| 页游| 邢台县| 石门县| 毕节市| 察雅县| 伊宁县| 东明县|