Follow
Sravani Teja Bulusu
Sravani Teja Bulusu
University paul sabatier
Verified email at irit.fr
Title
Cited by
Cited by
Year
Which security requirements engineering methodology should i choose?: Towards a requirements engineering-based evaluation approach
ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri
Proceedings of the 12th International Conference on Availability …, 2017
132017
A Requirements Engineering-Based Approach for Evaluating Security Requirements Engineering Methodologies
ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri
Information Technology-New Generations, 517-525, 2018
102018
Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies
ST Bulusu, R Laborde, AS Wazan, F Barrere, A Benzekri
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1316-1318, 2018
72018
Describing advanced persistent threats using a multi-agent system approach
ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri
Cyber Security in Networking Conference (CSNet), 2017 1st, 1-3, 2017
62017
Towards the weaving of the characteristics of good security requirements
ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri
International Conference on Risks and Security of Internet and Systems, 60-74, 2016
52016
Méthodologie d'ingénierie des exigences de sécurité réseau
ST Bulusu
Université de Toulouse, Université Toulouse III-Paul Sabatier, 2019
12019
Survey and analysis of DNS infrastructures
G Bonnoron, D Crémilleux, ST Bulusu, X Zhu, G Valadon
CNRS, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–7