Toward extraction of security requirements from text: Poster

H Guo, Ö Kafalı, AL Jeukeng, L Williams… - Proceedings of the 5th …, 2018 - dl.acm.org
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018dl.acm.org
We propose and evaluate an information extraction and analysis framework that combines
human intelligent (crowdsourcing) with automated methods to produce improved security
and privacy requirements incorporating knowledge from post-deployment artifacts such as
breach reports.
We propose and evaluate an information extraction and analysis framework that combines human intelligent (crowdsourcing) with automated methods to produce improved security and privacy requirements incorporating knowledge from post-deployment artifacts such as breach reports.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果

Google学术搜索按钮

example.edu/paper.pdf
搜索
获取 PDF 文件
引用
References