The state of the art in automated requirements elicitation

H Meth, M Brhel, A Maedche - Information and Software Technology, 2013 - Elsevier
Context In large software development projects a huge number of unstructured text
documents from various stakeholders becomes available and needs to be analyzed and …

Advances in automated support for requirements engineering: a systematic literature review

MA Umar, K Lano - Requirements Engineering, 2024 - Springer
Requirements Engineering (RE) has undergone several transitions over the years, from
traditional methods to agile approaches emphasising increased automation. In many …

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts

M Riaz, J King, J Slankas… - 2014 IEEE 22nd …, 2014 - ieeexplore.ieee.org
Natural language artifacts, such as requirements specifications, often explicitly state the
security requirements for software systems. However, these artifacts may also imply …

Supporting privacy impact assessment by model-based privacy analysis

AS Ahmadian, D Strüber, V Riediger… - Proceedings of the 33rd …, 2018 - dl.acm.org
According to Article 35 of the General Data Protection Regulation (GDPR), data controllers
are obligated to conduct a privacy impact assessment (PIA) to ensure the protection of …

Transformed vargha-delaney effect size

G Neumann, M Harman, S Poulding - … 2015, Bergamo, Italy, September 5-7 …, 2015 - Springer
Researchers without a technical background in statistics may be tempted to apply analytical
techniques in a ritualistic manner. SBSE research is not immune to this problem. We argue …

Requirements document relations: A reuse perspective on traceability through standards

K Großer, V Riediger, J Jürjens - Software and Systems Modeling, 2022 - Springer
Relations between requirements are part of nearly every requirements engineering
approach. Yet, relations of views, such as requirements documents, are scarcely …

A framework for semi-automated co-evolution of security knowledge and system models

J Bürger, D Strüber, S Gärtner, T Ruhroth… - Journal of Systems and …, 2018 - Elsevier
Security is an important and challenging quality aspect of software-intensive systems,
becoming even more demanding regarding long-living systems. Novel attacks and changing …

[PDF][PDF] A review on factors influencing implementation of secure software development practices

SL Kanniah, MN Mahrin - International Journal of Computer and …, 2016 - academia.edu
More and more businesses and services are depending on software to run their daily
operations and business services. At the same time, cyber-attacNs are becoming more …

Model-based privacy and security analysis with CARiSMA

AS Ahmadian, S Peldszus, Q Ramadan… - Proceedings of the 2017 …, 2017 - dl.acm.org
We present CARiSMA, a tool that is originally designed to support model-based security
analysis of IT systems. In our recent work, we added several new functionalities to CARiSMA …

Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements

AS Ahmadian, J Jürjens, D Strüber - … of the 33rd annual ACM symposium …, 2018 - dl.acm.org
Considering the dramatic impact of the current technology changes on user privacy, it is
important to contemplate privacy early on in software development. Ensuring privacy is …