Author:
Haley C.B.,Laney R.C.,Moffett J.D.,Nuseibeh B.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. What do you assume? A Theory of Security-Related Assumptions;Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings;2024-04-14
2. A grounded analysis of experts’ decision-making during security assessments;Journal of Cybersecurity;2016-10-05
3. Innovative Strategies for Secure Software Development;Software Design and Development;2014
4. Towards HIPAA-Compliant Healthcare Systems in Cloud Computing;International Journal of Computational Models and Algorithms in Medicine;2012-04
5. Security Requirements Engineering for Evolving Software Systems;International Journal of Secure Software Engineering;2010-01