Formal modelling of OWL ontologies-based requirements for the development of safe and secure smart city systems
暂无分享,去创建一个
[1] Pete Sawyer,et al. Requirements Engineering: A Good Practice Guide , 1997 .
[2] Tasawar Hayat,et al. Application of reproducing kernel algorithm for solving second-order, two-point fuzzy boundary value problems , 2017, Soft Comput..
[3] Adel Said Elmaghraby,et al. Cyber security challenges in Smart Cities: Safety, security and privacy , 2014, Journal of advanced research.
[4] Tatiana Avdeenko,et al. The ontology-based approach to support the completeness and consistency of the requirements specification , 2015, 2015 International Siberian Conference on Control and Communications (SIBCON).
[5] Lukas Ladenberger,et al. A method and tool for tracing requirements into specifications , 2014, Sci. Comput. Program..
[6] Mohamed El-Attar,et al. Using security robustness analysis for early-stage validation of functional security requirements , 2014, Requirements Engineering.
[7] Xiaohui Liang,et al. Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.
[8] Omar Abu Arqub,et al. Adaptation of reproducing kernel algorithm for solving fuzzy Fredholm–Volterra integrodifferential equations , 2017, Neural Computing and Applications.
[9] Jéssyka Vilela,et al. Applications of ontologies in requirements engineering: a systematic review of the literature , 2015, Requirements Engineering.
[10] W. N. Borst,et al. Construction of Engineering Ontologies for Knowledge Sharing and Reuse , 1997 .
[11] Yarden Katz,et al. Pellet: A practical OWL-DL reasoner , 2007, J. Web Semant..
[12] Corina Cîrstea,et al. Building traceable Event-B models from requirements , 2015, Sci. Comput. Program..
[13] Jéssyka Vilela,et al. A Systematic Review on the Use of Ontologies in Requirements Engineering , 2014, 2014 Brazilian Symposium on Software Engineering.
[14] Kaarel Kaljurand,et al. Verbalizing OWL in Attempto Controlled English , 2007, OWLED.
[15] Rafael Capilla,et al. A Meta-model for Requirements Engineering in System Family Context for Software Process Improvement Using CMMI , 2005, PROFES.
[16] Quang Huy Nguyen,et al. Industrial Use of Formal Methods for a High-Level Security Evaluation , 2008, FM.
[17] Martyn Thomas. The industrial use of formal methods , 1993, Microprocess. Microsystems.
[18] Gerald M. Weinberg,et al. Quality software management: volume 4: anticipating change , 1997 .
[19] Alfredo Pérez-Rueda,et al. Determinants of multi-service smartcard success for smart cities development: A study based on citizens' privacy and security perceptions , 2015, Gov. Inf. Q..
[20] Thai Son Hoang,et al. Rodin: an open toolset for modelling and reasoning in Event-B , 2010, International Journal on Software Tools for Technology Transfer.
[21] Za'er Salim Abo-Hammour,et al. Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm , 2014, Inf. Sci..
[22] Eman H. Alkhammash. Derivation of Event-B Models from OWL Ontologies , 2016 .
[23] M. L. Caliusco,et al. The Use of Ontologies in Requirements Engineering , 2010 .
[24] Lei Cui,et al. Security and Privacy in Smart Cities: Challenges and Opportunities , 2018, IEEE Access.
[25] Sidney C. Bailin,et al. Software requirements engineering , 2011 .
[26] Jean-Raymond Abrial,et al. Modeling in event-b - system and software engineering by Jean-Raymond Abrial , 2010, SOEN.
[27] Anne Elisabeth Haxthausen. Towards a Framework for Modelling and Verification of Relay Interlocking Systems , 2010, Monterey Workshop.
[28] Jim Woodcock,et al. Industrial Deployment of Formal Methods: Trends and Challenges , 2013, Industrial Deployment of System Engineering Methods.
[29] Mustapha Bourahla,et al. Towards an Ontology for UML State Machines , 2014 .
[30] Tasawar Hayat,et al. Numerical solutions of fuzzy differential equations using reproducing kernel Hilbert space method , 2015, Soft Computing.
[31] Liesbet van Zoonen,et al. Privacy concerns in smart cities , 2016, Gov. Inf. Q..
[32] J. Li,et al. Smart city and the applications , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).
[33] Gerold Schneider,et al. Attempto Controlled English Meets the Challenges of Knowledge Representation, Reasoning, Interoperability and User Interfaces , 2006, FLAIRS.
[34] Petr Kroha,et al. Ontologies in Checking for Inconsistency of Requirements Specification , 2009, 2009 Third International Conference on Advances in Semantic Processing.
[35] Michael J. Butler,et al. Control Systems: Phenomena and Structuring Functional Requirement Documents , 2012, 2012 IEEE 17th International Conference on Engineering of Complex Computer Systems.