default search action
1st ESPRE@RE 2014: Karlskrona, Sweden
- Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2014, 25 August, 2014, Karlskrona, Sweden. IEEE Computer Society 2014, ISBN 978-1-4799-6340-9 - Tom-Michael Hesse, Stefan Gärtner, Tobias Roehm, Barbara Paech, Kurt Schneider, Bernd Bruegge:
Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring. 1-6 - Dan Ionita, Jan-Willem Bullee, Roel J. Wieringa:
Argumentation-based security requirements elicitation: The next round. 7-12 - Hanan Hibshi, Travis D. Breaux, Maria Riaz, Laurie A. Williams:
Towards a framework to measure security expertise in requirements analysis. 13-18 - Yod Samuel Martín, José M. del Álamo, Juan C. Yelmo:
Engineering privacy requirements valuable lessons from another realm. 19-24 - Aaron Alva, Lisa Young:
L-SQUARE: Preliminary extension of the SQUARE methodology to address legal compliance. 25-30 - Wolfgang Raschke, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, Christian Steger, Christian Kreiner:
Supporting evolving security models for an agile security evaluation. 31-36 - Naney R. Mead, Jose Andre Morales:
Using malware analysis to improve security requirements on future systems. 37-41 - Azadeh Alebrahim, Denis Hatebur, Ludger Goeke:
Pattern-based and ISO 27001 compliant risk analysis for cloud systems. 42-47
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.