


default search action
4. APRES 2017: Melaka, Malaysia
- Massila Kamalrudin, Sabrina Ahmad, Naveed Ikram:
Requirements Engineering for Internet of Things - 4th Asia-Pacific Symposium, APRES 2017, Melaka, Malaysia, November 9-10, 2017, Proceedings. Communications in Computer and Information Science 809, Springer 2018, ISBN 978-981-10-7795-1
Big Data
- Affan Yasin
, Lin Liu, Zhanqiang Cao, Jianmin Wang, Yingbo Liu, Sheau Ling Tan:
Big Data Services Requirements Analysis. 3-14 - Colin M. Werner
, Daniel M. Berry:
An Empirical Study of the Software Development Process, Including Its Requirements Engineering, at Very Large Organization: How to Use Data Mining in Such a Study. 15-25
Cyber Security
- Seung-Jun Kim, Seok-Won Lee:
Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats. 29-40 - Haruhiko Kaiya, Nobukazu Yoshioka
, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata
, Takafumi Tanaka:
Eliciting Requirements for Improving Users' Behavior Using Transparency. 41-56 - Irish Singh
, Seok-Won Lee:
Comparative Requirements Analysis for the Feasibility of Blockchain for Secure Cloud. 57-72 - Massila Kamalrudin
, Nuridawati Mustafa
, Safiah Sidek:
A Template for Writing Security Requirements. 73-86 - Massila Kamalrudin
, Asma Asdayana Ibrahim, Safiah Sidek:
A Security Requirements Library for the Development of Internet of Things (IoT) Applications. 87-96
Crowd-Sourcing
- Chunhui Wang, Wei Zhang, Haiyan Zhao, Zhi Jin:
Eliciting Activity Requirements from Crowd Using Genetic Algorithm. 99-113 - Muneera Bano
, Didar Zowghi
:
Crowd Vigilante - Detecting Sabotage in Crowdsourcing. 114-120
Requirements Challenges
- Anbreen Javed, Naveed Ikram, Faiza Ghazanfar:
A Systematic Mapping Study of Empirical Research in GORE. 123-139 - Yuanbang Li, Rong Peng, Bangchao Wang
:
Challenges in Context-Aware Requirements Modeling: A Systematic Literature Review. 140-155 - Jalal Shah, Nazri Kama
:
Issues of Using Function Point Analysis Method for Requirement Changes During Software Development Phase. 156-163 - Ahmad M. Salih, Mazni Omar
, Azman Yasin:
Understanding Uncertainty of Software Requirements Engineering: A Systematic Literature Review Protocol. 164-171
Automation
- Hironori Shimada, Hiroyuki Nakagawa
, Tatsuhiro Tsuchiya
:
Constructing a Goal Model from Requirements Descriptions Based on Extraction Rules. 175-188 - Wen Zhong, Yan Wang, Xiaohong Chen:
New Requirements Elicited from Accidents of Train Control System Simulated by Modelica. 189-204

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.