Sciweavers

410 search results - page 1 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
143
Voted
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
14 years 2 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
ASIASIM
2004
Springer
15 years 4 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
79
Voted
ICML
1998
IEEE
15 years 11 months ago
A Case Study in the Use of Theory Revision in Requirements Validation
T. L. McCluskey, Margaret Mary West
CAI
2006
Springer
14 years 11 months ago
Addressing the Conflicting Dimension of Groupware: A Case Study in Software Requirements Validation
This paper addresses the conflicting dimension of groupware, seeking the reconciliation of two very different assumptions about the users' attitudes using groupware tools: use...
Pedro Antunes, João Ramires, Ana Resp&iacut...
77
Voted
ICRE
2000
IEEE
15 years 3 months ago
Lightweight Validation of Natural Language Requirements: A Case Study
Vincenzo Gervasi, Bashar Nuseibeh