Author:
Baldassarre Maria Teresa,Barletta Vita Santa,Caivano Danilo,Piccinno Antonio,Scalera Michele
Publisher
Springer International Publishing
Reference23 articles.
1. CIS benchmarks. https://www.cisecurity.org/cis-benchmarks
2. OWASP Top10 - 2017. Tthe ten most critical web application security risks. https://owasp.org
3. Al-Slais, Y.: Privacy engineering methodologies: a survey. In: 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), pp. 1–6 (2020). https://doi.org/10.1109/3ICT51146.2020.9311949
4. Ansari, M.T.J., Baz, A., Alhakami, H., Alhakami, W., Kumar, R., Khan, R.A.: P-STORE: extension of STORE methodology to elicit privacy requirements. Arab. J. Sci. Eng. 46(9), 8287–8310 (2021). https://doi.org/10.1007/s13369-021-05476-z
5. Ansari, M., Pandey, D., Alenezi, M.: STORE: security threat oriented requirements engineering methodology. J. King Saud Univ. Comput. Inf. Sci. 34(2), 191–203 (2018). https://doi.org/10.1016/j.jksuci.2018.12.005
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献