Measuring the Software Security Requirements Engineering Process
暂无分享,去创建一个
[1] Jeffrey A. Ingalsbe,et al. Threat Modeling: Diving into the Deep End , 2008, IEEE Software.
[2] Nancy R. Mead,et al. Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.
[3] Nancy R. Mead,et al. Incorporating Security Requirements Engineering into the Dynamic Systems Development Method , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.
[4] Shari Lawrence Pfleeger,et al. Cybersecurity Economic Issues: Clearing the Path to Good Practice , 2008, IEEE Software.
[5] Christopher J. Alberts,et al. Risk-Based Measurement and Analysis: Application to Software Security , 2012 .
[6] Mohammad Zulkernine,et al. On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[7] Martin Gilje Jaatun,et al. Security Requirements for the Rest of Us: A Survey , 2008, IEEE Software.
[8] Nancy R. Mead,et al. Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets , 2007, IEEE Security & Privacy.
[9] Nancy R. Mead,et al. Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.
[10] Nancy R. Mead,et al. SQUARE-Lite: Case Study on VADSoft Project , 2008 .