A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
Writing quality security requirements contributes to the success of secure software development. It has been a common practice to include security requirements in a software system after the system is defined. Thus, incorporating security requirements at a later stage of software development will in...
| Main Author: | Mustafa, Nuridawati |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/25407/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=119774 |
| Abstract | Abstract here |
Similar Items
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020)
by: Mustafa, Nuridawati
Published: (2020)
A completeness evaluation of patient records in medical tourism using completeness evaluation tool
by: Nor Rabbiatun, Mohamed Nazri
Published: (2014)
by: Nor Rabbiatun, Mohamed Nazri
Published: (2014)
A Software Requirements Defect Management Approach Using Negotiation Technique To Improve Software Requirements Quality
by: Rosmadi, Nurul Atikah
Published: (2018)
by: Rosmadi, Nurul Atikah
Published: (2018)
Complete decompositions of groups and related problems / Wang Kah Lun
by: Wang , Kah Lun
Published: (2023)
by: Wang , Kah Lun
Published: (2023)
Tool-assisted model for software requirement negotiation
by: Lau, Hong Sheng
Published: (2015)
by: Lau, Hong Sheng
Published: (2015)
Geometric representations of distinct Hamiltonian circuits in complete graph decomposition
by: Maizon, Mohd Darus
Published: (2015)
by: Maizon, Mohd Darus
Published: (2015)
Template neural particle optimization for vehicle license plate recognition
by: A Jalil, Norazira
Published: (2015)
by: A Jalil, Norazira
Published: (2015)
An improved hierarchical clustering combination approach for software modularization
by: Naseem, Rashid
Published: (2017)
by: Naseem, Rashid
Published: (2017)
Information quality structure framework in developing an information security management system (ISMS)
by: Palaniappan, P Siva Shamala
Published: (2017)
by: Palaniappan, P Siva Shamala
Published: (2017)
Customization Of Requirements Modeling Tool For Software Engineering Education
by: Subhiyakto, Egia Rosi
Published: (2014)
by: Subhiyakto, Egia Rosi
Published: (2014)
Software defect prediction framework based on hybrid metaheuristic optimization methods
by: Wahono, Romi Satria
Published: (2015)
by: Wahono, Romi Satria
Published: (2015)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
An empirical study of the information security awareness model in Oman
by: Al Shanfari, Issam Shaaban Moshaded
Published: (2023)
by: Al Shanfari, Issam Shaaban Moshaded
Published: (2023)
Ontology-driven and template-based approach for usability requirements elicitation and specification
by: Too, Chian Wen
Published: (2018)
by: Too, Chian Wen
Published: (2018)
Steganography for securing image data using hybrid SLT and DCT
by: Rachmawanto, Eko Hari
Published: (2012)
by: Rachmawanto, Eko Hari
Published: (2012)
Factor Criteria Metric (FCM) for requirements analysis phase in the development of management information systems / Chew Wei Yin.
by: Chew, Wei Yin
Published: (2000)
by: Chew, Wei Yin
Published: (2000)
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
by: Fatin Nabila , Abd Latiff
Published: (2021)
by: Fatin Nabila , Abd Latiff
Published: (2021)
Evaluation of education system design using the socio-constructivist and software heuristic approaches / Sarinder Kaur a/p Kashmir Singh.
by: Kashmir Singh, Sarinder Kaur
Published: (2002)
by: Kashmir Singh, Sarinder Kaur
Published: (2002)
Completion time driven hyper-heuristic approach for optimisation of scientific workflow scheduling in cloud environment / Ehab Nabiel Mohammad
by: Ehab Nabiel , Mohammad
Published: (2018)
by: Ehab Nabiel , Mohammad
Published: (2018)
Estimation technique for software project planning
by: Periasamy, Sobah
Published: (2010)
by: Periasamy, Sobah
Published: (2010)
Cognitive load theory based model in mathematics software
by: Erni Marlina Saari
Published: (2011)
by: Erni Marlina Saari
Published: (2011)
A model of artificial intelligence in cyber security of scada to enhance public safety in UAE
by: Alhashmi, Omar
Published: (2023)
by: Alhashmi, Omar
Published: (2023)
An integrated development environment on problem-solving for C programming fundamentals
by: Nor Farahwahida Mohd Noor
Published: (2022)
by: Nor Farahwahida Mohd Noor
Published: (2022)
Eliciting security requirements for internet of things software application development using semi-formalized model approach
by: Ibrahim, Asma Asdayana
Published: (2022)
by: Ibrahim, Asma Asdayana
Published: (2022)
A new human-centric model of airport smart security system to enhance the passenger experience
by: Almarri, Ghalib Abdulla
Published: (2021)
by: Almarri, Ghalib Abdulla
Published: (2021)
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
by: Abusalama, Jawad
Published: (2025)
by: Abusalama, Jawad
Published: (2025)
Secure unlinkability schemes for privacy preserving data publishing in weighted social networks / Chong Kah Meng
by: Chong , Kah Meng
Published: (2020)
by: Chong , Kah Meng
Published: (2020)
Integrated framework on decentralized E-Government in Iraqi higher education using hybrid approach
by: Fuaad Ali, Ali
Published: (2025)
by: Fuaad Ali, Ali
Published: (2025)
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
by: Barkah, Azhari Shouni
Published: (2025)
by: Barkah, Azhari Shouni
Published: (2025)
A selection framework for software programmer applicants based on multi-criteria analysis
by: Fayiz Mohad Said Hamed Momani
Published: (2019)
by: Fayiz Mohad Said Hamed Momani
Published: (2019)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Practical approach to knowledge-based question answering with natural language understanding and advanced reasoning
by: Wilson, Wong Yik Sen
Published: (2005)
by: Wilson, Wong Yik Sen
Published: (2005)
Hybridization Of Deterministic And Metaheuristic Approaches In Global Optimization
by: Goh, Khang Wen
Published: (2019)
by: Goh, Khang Wen
Published: (2019)
A Framework For Classification Software Security Using Common Vulnerabilities And Exposures
by: Hassan, Nor Hafeizah
Published: (2018)
by: Hassan, Nor Hafeizah
Published: (2018)
Voltage instability analysis of electric power systems using artificial neural network based approach
by: Mohamad Nor, Ahmad Fateh
Published: (2017)
by: Mohamad Nor, Ahmad Fateh
Published: (2017)
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
by: Mohd Foozy, Cik Feresa
Published: (2017)
by: Mohd Foozy, Cik Feresa
Published: (2017)
Benchmarking framework for IDS classifiers in term of security and performance based on multicriteria analysis
by: Alamleh, Amneh Hussein Mohd
Published: (2022)
by: Alamleh, Amneh Hussein Mohd
Published: (2022)
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
by: Affandy
Published: (2015)
by: Affandy
Published: (2015)
Constructing Polymorphic Virus Analysis System Using Behavior Detection Approach
by: Fauzi Adi, Rafrastara
Published: (2010)
by: Fauzi Adi, Rafrastara
Published: (2010)
Constructing polymorphic virus analysis system using behavior detection approach
by: Rasrastara, Fauzi Adi
Published: (2010)
by: Rasrastara, Fauzi Adi
Published: (2010)
Similar Items
-
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020) -
A completeness evaluation of patient records in medical tourism using completeness evaluation tool
by: Nor Rabbiatun, Mohamed Nazri
Published: (2014) -
A Software Requirements Defect Management Approach Using Negotiation Technique To Improve Software Requirements Quality
by: Rosmadi, Nurul Atikah
Published: (2018) -
Complete decompositions of groups and related problems / Wang Kah Lun
by: Wang , Kah Lun
Published: (2023) -
Tool-assisted model for software requirement negotiation
by: Lau, Hong Sheng
Published: (2015)
