Which security requirements engineering methodology should i choose?: Towards a requirements engineering-based evaluation approach ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri Proceedings of the 12th International Conference on Availability …, 2017 | 13 | 2017 |
A Requirements Engineering-Based Approach for Evaluating Security Requirements Engineering Methodologies ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri Information Technology-New Generations, 517-525, 2018 | 10 | 2018 |
Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies ST Bulusu, R Laborde, AS Wazan, F Barrere, A Benzekri Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1316-1318, 2018 | 7 | 2018 |
Describing advanced persistent threats using a multi-agent system approach ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri Cyber Security in Networking Conference (CSNet), 2017 1st, 1-3, 2017 | 6 | 2017 |
Towards the weaving of the characteristics of good security requirements ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri International Conference on Risks and Security of Internet and Systems, 60-74, 2016 | 5 | 2016 |
Méthodologie d'ingénierie des exigences de sécurité réseau ST Bulusu Université de Toulouse, Université Toulouse III-Paul Sabatier, 2019 | 1 | 2019 |
Survey and analysis of DNS infrastructures G Bonnoron, D Crémilleux, ST Bulusu, X Zhu, G Valadon CNRS, 2016 | 1 | 2016 |