找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Requirements Engineering for Internet of Things; 4th Asia-Pacific Sym Massila Kamalrudin,Sabrina Ahmad,Naveed Ikram Conference proceedings

[復(fù)制鏈接]
樓主: introspective
21#
發(fā)表于 2025-3-25 07:25:01 | 只看該作者
22#
發(fā)表于 2025-3-25 09:23:10 | 只看該作者
Crowd Vigilantend analysis of data from the same crowdsourced project where the threat is situated. The proposed framework aims to improve the security of the crowdsourced projects and their outcomes by building confidence about the trustworthiness of the workers.
23#
發(fā)表于 2025-3-25 14:39:50 | 只看該作者
24#
發(fā)表于 2025-3-25 19:25:37 | 只看該作者
Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats social engineering attacks, and make it possible to obtain appropriate security requirements by modeling the relationships among human vulnerability, social engineering attacks and security requirements.
25#
發(fā)表于 2025-3-25 20:57:04 | 只看該作者
26#
發(fā)表于 2025-3-26 00:49:15 | 只看該作者
An Empirical Study of the Software Development Process, Including Its Requirements Engineering, at Vfic areas of the development process, particularly its requirements engineering, to improve the likelihood of success for future projects..While describing the results of the empirical study, the paper also shows how such a study can be conducted even when the mined data are not very detailed.
27#
發(fā)表于 2025-3-26 04:47:16 | 只看該作者
Eliciting Requirements for Improving Users’ Behavior Using Transparency no one can directly manipulate users but transparency has an influence on users’ behavior. We expect users will voluntarily behave better than ever when the system provides suitable information flows. We represent our method by using KAOS goal modeling notation, and show examples how it works.
28#
發(fā)表于 2025-3-26 10:38:21 | 只看該作者
29#
發(fā)表于 2025-3-26 14:05:25 | 只看該作者
Challenges in Context-Aware Requirements Modeling: A Systematic Literature Reviewudies and extract available data aimed at the objectives. Seventy-two studies are finally selected. After data synthesis, we identify 4 categories of 13 challenges in context-aware requirements modeling. Based on the findings, we analyze the extent to which the challenges have been addressed and suggest future research directions.
30#
發(fā)表于 2025-3-26 17:32:17 | 只看該作者
Constructing a Goal Model from Requirements Descriptions Based on Extraction Rulesm the goals. To evaluate our process, we applied the process to two system descriptions to construct goal models. The results show that the proposed process extracted appropriate goals and successfully assembled these goals in a goal hierarchy. We also report preliminary results of automating the proposed process.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-19 00:57
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
来安县| 河西区| 娄底市| 宿州市| 徐水县| 左贡县| 民权县| 彩票| 广丰县| 临泉县| 富民县| 新化县| 台北市| 正定县| 芒康县| 亚东县| 宜阳县| 长春市| 秦安县| 长兴县| 祁连县| 宁安市| 理塘县| 安图县| 桂林市| 吉林省| 大庆市| 宝山区| 威海市| 宕昌县| 宣化县| 天祝| 淅川县| 宜良县| 贵阳市| 濮阳市| 剑河县| 怀来县| 长海县| 尤溪县| 封丘县|