Towards Improved Network Security Requirements and Policy: Domain-Specific Completeness Analysis via Topic Modeling
暂无分享,去创建一个
Jane Huffman Hayes | Alex Dekhtyar | Dongfeng Fang | Jared Payne | Emily Essex | Kelsey Cole | Joseph Alverson | Grant Bernosky
[1] Rajeev R. Raje,et al. Analyzing and evaluating security features in software requirements , 2016, 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH).
[2] Hiroki Sakaji,et al. Extraction of Focused Topic and Sentiment of Financial Market by using Supervised Topic Model for Price Movement Prediction , 2019, 2019 IEEE Conference on Computational Intelligence for Financial Engineering & Economics (CIFEr).
[3] David McMenemy,et al. ‘To be understood as to understand’: A readability analysis of public library acceptable use policies , 2019, J. Libr. Inf. Sci..
[4] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[5] David McMenemy,et al. Management of acceptable use of computing facilities in the public library: avoiding a panoptic gaze? , 2015, J. Documentation.
[6] Alan M. Davis,et al. Software requirements - analysis and specification , 1990 .