Goal-oriented requirements engineering: an extended systematic mapping study J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, L Piras, ... Requirements Engineering 24 (2), 133-160, 2019 | 206 | 2019 |
A systematic literature review of methods and datasets for anomaly-based network intrusion detection Z Yang, X Liu, T Li, D Wu, J Wang, Y Zhao, H Han Computers & Security 116, 102675, 2022 | 145 | 2022 |
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG) A Yasin, L Liu, T Li, J Wang, D Zowghi Information and Software Technology 95, 179-200, 2018 | 99 | 2018 |
Improving software security awareness using a serious game A Yasin, L Liu, T Li, R Fatima, W Jianmin IET Software 13 (2), 159-169, 2019 | 85 | 2019 |
Designing IT systems according to environmental settings: a strategic analysis framework H Zhang, L Liu, T Li The Journal of Strategic Information Systems 20 (1), 80-95, 2011 | 80 | 2011 |
Goal-oriented requirements engineering: a systematic literature map J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, ... 2016 IEEE 24th International Requirements Engineering Conference (RE), 106-115, 2016 | 79 | 2016 |
Why Requirements Engineering Fails: A Survey Report from China L Liu, T Li, F Peng Requirements Engineering Conference (RE), 2010 18th IEEE International, 317-322, 2010 | 66 | 2010 |
An effective sarcasm detection approach based on sentimental context and individual expression habits Y Du, T Li, MS Pathan, HK Teklehaimanot, Z Yang Cognitive Computation 14 (1), 78-90, 2022 | 52 | 2022 |
A GAN and Feature Selection‐Based Oversampling Technique for Intrusion Detection X Liu, T Li, R Zhang, D Wu, Y Liu, Z Yang Security and Communication Networks 2021 (1), 9947059, 2021 | 49 | 2021 |
Taking Goal Models Downstream: A Systematic Roadmap J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos, ... RCIS 2014, 2014 | 48 | 2014 |
Using Goal Models Downstream: A Systematic Roadmap and Literature Review J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos International Journal of Information System Modeling and Design (IJISMD) 6 …, 2015 | 42 | 2015 |
Security Attack Analysis Using Attack Patterns T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers | 41 | 2016 |
Dealing with security requirements for socio-technical systems: A holistic approach T Li, J Horkoff Advanced Information Systems Engineering: 26th International Conference …, 2014 | 40 | 2014 |
An Outlier Detection Approach Based on Improved Self-Organizing Feature Map Clustering Algorithm P Yang, D Wang, Z Wei, X Du, T Li IEEE Access 7, 115914-115925, 2019 | 39 | 2019 |
Security requirements engineering in the wild: A survey of common practices G Elahi, E Yu, T Li, L Liu Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th …, 2011 | 39 | 2011 |
How stakeholders’ data literacy contributes to student success in higher education: a goal-oriented analysis N Yang, T Li International Journal of Educational Technology in Higher Education 17 (1), 41, 2020 | 33 | 2020 |
An ontology-based learning approach for automatically classifying security requirements T Li, Z Chen Journal of Systems and Software 165, 110566, 2020 | 33 | 2020 |
Integrating security patterns with security requirements analysis using contextual goal models T Li, J Horkoff, J Mylopoulos The Practice of Enterprise Modeling: 7th IFIP WG 8.1 Working Conference …, 2014 | 29 | 2014 |
Holistic security requirements analysis for socio-technical systems T Li, J Horkoff, J Mylopoulos Software & Systems Modeling 17, 1253-1285, 2018 | 26 | 2018 |
Sentiment Classification Based on Information Geometry and Deep Belief Networks M Wang, ZH Ning, C Xiao, T Li IEEE Access 6, 35206-35213, 2018 | 24 | 2018 |