لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
.ق و کامپیوتر، تهران، ایران، 1 تا 3 اسفند 1385 ...
دانشگاه شهید بهشتی، دانشکده مهندسی برق و کامپیوتر، تهران، ایران، ...
Nancy R. Mead, Gary McGraw, From the Ground Up: The ...
J. Haralambos Mouratidis, Paolo Giorgini, Gordon Manson, Eder, M. Missikiff, ...
Gerald Brose, Manuel Koch, Klaus-Peter Lohr, Integrating Security Policy Design ...
Jayaram K R and Aditya P. Mathur, Software Engineering for ...
Qingfeng. He, Annie I. Anton, A Framework for Modeling Privacy ...
Proceedings of UML'02, LNCS 2460, pages 426-441, S p ringer-Verlag, ...
Josh Pauli, Dianxiang Xu, Trade-of Analysis of Misuse Case-based Secure ...
Joshua Pauli, Dianxiang Xu, THREAT-DRI VEN ARCHI TECTURAL DESIGN OF ...
Dianxiang Xu, Joshua J. Pauli1, Threat-Driven Design and Analysis of ...
J. Jurjens, Towards Secure Systems Development with UMLsec, Fundamental Approaches ...
Bashar Nuseibeh, Steve Easterbrook, Requirements Engineering: A Roadmap, Proceedings of ...
Robert Crook, Darrel Ince, Luncheng Lin, Bashar Nuseibeh, Security Requirements ...
PACO HOPE, GARY MCGRAW, ANNIE I. ANTO N, Misuse and ...
F. Swiderski, W. Snyder, Threat Modeling. Microsoft Press, 2004. ...
Charles B. Haley, Jonathan D. Moffett, Robin Laney, Bashar Nuseibeh, ...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck, Roel Wieringa, A ...
John Viega, Building Security Requirements with CLASP, International Conference on ...
Ian Alexander, Misuse Cases: Use Cases with Hostile Intent, Journal ...
Suvda Myagmar, Adam Lee, William Yurcik, Threat Modeling as a ...
Donald G. Firesmith, Analyzing the Security Significance of System Requirements, ...
John Wilander, Jens Gustavsson, Security Requirements _ A Field Study ...
Ware M.S, Bowles J.B, Eastman C.M, Using the Common Criteria ...
Donald G. Firesmith, Security Use Cases, Journal of Object Technology, ...
Denis Verdon, Gary McGraw, Risk analysis in software design, IEEE ...
Paolo Giorgini, Fabio Massacci, Nicola Zannone, Security and Trust Requirements ...
Viega J. The CLASP Application Security Process, Volume 1.1. Training ...
D.G. Firesmith, Common Concepts Underlying Safety, Security, and Survivability, Technical ...
Firesmith D. G, Engineering Security Requirements, In Journal of Object ...
IEEE, IEEE-STD 610, 12-1990, ieee standard glossary of software engineering ...
K. Allenby, _ Kelly, Deriving Requirements Using Scenarios, In Proceedings ...
I. Alexander, Misuse Cases Help to Elicit Non Functiona1 Requirements, ...
I. Alexander, Modeling the Interplay of Conflicting Goals with Use ...
I. Alexander, Initial Industrial Experience of Misuse Cases, Proceedings of ...
L. Liu, E. Yu, J. Mylopoulos, Security and Privacy Requirements ...
I. Jacobson, M. Christerson, P. Jonsson, G. Overgaard, Object- Oriented ...
N. Leveson, M. Heimdahl, New Approaches to Critical- Systems Survivability: ...
Greg Hoglund, Gary McGraw, Exploiting Software: How to Break Code, ...
H. Mouratidis, P. Giorgini, G. Manson, Modeling secure multi agent ...
P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, Requirements Engineering ...
P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, Filling the ...
P. Zave, Classification of Research Eforts in Requirements Engineering, ACM ...
R. Stevens, P. Brook, K. Jackson, S. Arnold, Systems Engineering: ...
McDermott J., Fox C., Using Abuse Care Models for Security ...
J. D. Moffett, B. Nuseibeh, A Framework for Security Requirements ...
نمایش کامل مراجع