1.
|
Book
|
Designing Secure Software by Testing Application of Security Patterns
(Collaboration)
2019/01
|
2.
|
Book
|
Designing Secure Software by Testing Application of Security Patterns
(Collaboration)
2019/01
|
3.
|
Papers
|
Evaluating Introduction of Systems by Goal Dependency Modeling
(Collaboration)
2024/10
|
4.
|
Papers
|
Finding Contributable Activities Using Non-Verb Attributes In Events
(Collaboration)
2023/09
|
5.
|
Papers
|
Practice-based Collection of Bad Smells in Machine Learning Projects
(Collaboration)
2023/09
|
6.
|
Papers
|
A Proposal to Find Mutually Contributable Business or Life Activities Using Conformance Checking
(Collaboration)
2022/09
|
7.
|
Papers
|
Efficient secure DevOps using process mining and Attack Defense Trees
(Collaboration)
2022/09
|
8.
|
Papers
|
A Study on Analyzing Learner Behaviors in State Machine Modeling Using Process Mining and Statistical Test
(Collaboration)
2022/08
|
9.
|
Papers
|
Reference Model for Agile Development of Machine Learning-based Service Systems
(Collaboration)
2021/12
|
10.
|
Papers
|
Tools for logging and analyzing goal dependency modeling
(Collaboration)
2021/08
|
11.
|
Papers
|
Systematic Literature Review of Security Pattern Research
(Collaboration)
2021/01
|
12.
|
Papers
|
A Tool to Manage Traceability on Several Models and Its Use Case
(Collaboration)
2020/10
|
13.
|
Papers
|
Evaluating Mutual Requirements Evolution of Several Information Systems
(Single)
2020/10
|
14.
|
Papers
|
Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling
(Collaboration)
2020/07
|
15.
|
Papers
|
Quantitative Analysis of Goal Oriented Requirements Models
(Single)
2020/07
|
16.
|
Papers
|
Mutual Requirements Evolution by Combining Different Information Systems
(Collaboration)
2019/11
|
17.
|
Papers
|
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base
(Collaboration)
2019/09
|
18.
|
Papers
|
Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques
(Collaboration)
2019/09
|
19.
|
Papers
|
Landscape of IoT patterns
(Collaboration)
2019/05
|
20.
|
Papers
|
Taxonomy and Literature Survey of Security Pattern Research
(Collaboration)
2018/11
|
21.
|
Papers
|
Meta-Requirements for Information System Requirements: Lesson Learned from Software Ecosystem Researches.
(Single)
2018/09
|
22.
|
Papers
|
Requirements Exploration by Comparing and Combining Models of Different Information Systems
(Collaboration)
2018/08
|
23.
|
Papers
|
Tool to Automatically Generate a Screen Transition Model Based on a Conceptual Model.
(Collaboration)
2018/08
|
24.
|
Papers
|
Security Requirement Modeling Support System using Software Security Knowledge Base
(Collaboration)
2018/07
|
25.
|
Papers
|
Generalizing and Composing Goals and Objects in a Scenario Together for Requirements Analysis
(Collaboration)
2018/03
|
26.
|
Papers
|
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services
(Collaboration)
2018/01
|
27.
|
Papers
|
Goal Modeling for Security Problem Matching and Pattern Enforcement
(Collaboration)
2017/12
|
28.
|
Papers
|
Eliciting requirements for improving users' behavior using transparency
(Collaboration)
2017/11
|
29.
|
Papers
|
A CASE tool for Goal Dependency Model with Attributes based on An Existing UML Editor
(Collaboration)
2017/09
|
30.
|
Papers
|
Preliminary Systematic Literature Review of Software and Systems Traceability
(Collaboration)
2017/09
|
31.
|
Papers
|
Identifying fundamental goals from objects in a scenario to facilitate system introduction
(Collaboration)
2017/07
|
32.
|
Papers
|
Traceability Link Mining - Focusing on Usability -
(Collaboration)
2017/07
|
33.
|
Papers
|
Early Requirements Analysis for a Socio-Technical System based on Goal Dependencies
(Collaboration)
2016/09
|
34.
|
Papers
|
Literature Survey on Technologies for Developing Privacy-aware Software
(Collaboration)
2016/09
|
35.
|
Papers
|
Modelling Goal Dependencies and Domain Model Together
(Single)
2016/09
|
36.
|
Papers
|
Requirements Analysis for Privacy Protection and Third Party Awareness using Logging Models
(Collaboration)
2016/09
|
37.
|
Papers
|
A Metamodel for Security and Privacy Knowledge in Cloud Services
(Collaboration)
2016/07
|
38.
|
Papers
|
Implementation Support of Security Design Patterns Using Test Templates
(Collaboration)
2016/06
|
39.
|
Papers
|
Annotating Goals with Concerns in Goal-Oriented Requirements Engineering
(Collaboration)
2016/02
|
40.
|
Papers
|
Finding Potential Threats in Several Security Targets for Eliciting Security Requirements
(Collaboration)
2015/10
|
41.
|
Papers
|
A Case-based Management System for Secure Software Development Using Software Security Knowledge
(Collaboration)
2015/09
|
42.
|
Papers
|
Case Base for Secure Software Development Using Software Security Knowledge Base
(Collaboration)
2015/07
|
43.
|
Papers
|
Multi-Dimensional Goal Refinement in Goal-Oriented Requirements Engineering
(Collaboration)
2015/07
|
44.
|
Papers
|
TESEM: A tool for verifying security design pattern applications by model testing
(Collaboration)
2015/04
|
45.
|
Papers
|
TBD
(Collaboration)
2015/01
|
46.
|
Papers
|
TBD
(Collaboration)
2015/01
|
47.
|
Papers
|
Security and Privacy Behavior Definition for Behavior Driven Development
(Collaboration)
2014/12
|
48.
|
Papers
|
Validating Security Design Pattern Applications by Testing Design Models
(Collaboration)
2014/12
|
49.
|
Papers
|
Verification of Implementing Security Design Patterns Using a Test Template
(Collaboration)
2014/09
|
50.
|
Papers
|
MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals
(Collaboration)
2014/07
|
51.
|
Papers
|
Requirements Refinement and Exploration of Architecture for Security and Other NFRs
(Collaboration)
2014/06
|
52.
|
Papers
|
Security Requirements Analysis Using Knowledge in CAPEC
(Collaboration)
2014/06
|
5 display
|
All display(52)
|