Last update: Sun Apr 28 02:05:21 MDT 2019
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Haley:2008:SRE,
author = "C. Haley and R. Laney and J. Moffett and B. Nuseibeh",
title = "Security Requirements Engineering: A Framework for
Representation and Analysis",
journal = j-IEEE-TRANS-SOFTW-ENG,
volume = "34",
number = "1",
pages = "133--153",
month = jan # "\slash " # feb,
year = "2008",
CODEN = "IESEDJ",
DOI = "https://doi.org/10.1109/TSE.2007.70754",
ISSN = "0098-5589 (print), 1939-3520 (electronic)",
ISSN-L = "0098-5589",
bibdate = "Thu Feb 1 11:00:42 MST 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2000.bib",
URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4359475",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Software Engineering",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}
Related entries
- analysis,
26(3)244,
26(5)453,
26(6)541,
26(7)617,
26(8)797,
26(9)849,
26(9)872,
26(11)1049,
27(4)351,
27(5)473,
27(6)481,
27(7)651,
27(8)728,
27(8)749,
27(11)1037,
28(2)113,
28(2)129,
28(6)529,
28(7)638,
28(8)763,
28(9)904,
28(10)933,
28(10)944,
28(10)984,
28(12)1146,
29(2)116,
29(2)133,
29(3)270,
29(4)297,
29(5)430,
29(6)495,
29(7)634,
29(7)649,
29(9)825,
29(10)883,
29(10)946,
29(11)1019,
30(2)97,
30(3)145,
30(3)172,
30(3)181,
30(4)218,
30(6)372,
30(10)634,
30(10)707,
30(11)715,
30(12)970,
30(12)993,
31(1)3,
31(1)38,
31(2)137,
31(2)166,
31(4)273,
31(7)551,
31(8)643,
31(11)913,
32(2)93,
32(2)111,
32(4)240,
32(4)279,
32(7)510,
32(8)547,
32(8)608,
32(9)664,
32(9)718,
32(10)771,
33(3)198,
33(5)273,
33(5)347,
33(6)385,
33(8)544,
33(9)592,
33(9)608,
33(10)643,
33(10)675,
33(11)781,
33(12)799,
34(4)516,
34(5)577,
35(1)2,
35(2)178,
35(2)195,
35(5)684
- engineering,
26(6)567,
26(7)662,
26(10)978,
27(1)42,
27(2)97,
28(1)30,
28(4)321,
28(8)721,
28(11)1039,
28(12)1171,
29(2)97,
29(9)782,
29(9)811,
29(10)0,
29(10)865,
29(12)1057,
30(1)0,
30(2)z,
30(3)0,
30(4)0,
30(6)353,
30(10)712,
30(12)873,
31(2)97,
31(2)99,
31(5)361,
31(9)733,
31(11)969,
32(5)330,
32(7)433,
32(7)510,
32(9)642,
32(11)910,
32(12)929,
33(2)87,
33(5)287,
33(12)891,
34(1)3,
34(2)226,
34(2)242,
34(2)304,
34(4)433,
35(1)67,
35(3)407,
35(4)551,
35(5)593,
35(6)737,
35(6)742,
35(6)756,
35(6)795
- framework,
26(1)36,
26(1)70,
26(6)484,
26(7)635,
26(10)959,
26(11)1101,
28(1)58,
28(5)478,
28(10)956,
29(1)15,
29(7)577,
29(12)1112,
30(3)145,
30(4)218,
30(5)282,
30(9)613,
30(10)656,
30(10)707,
32(5)330,
34(2)260,
34(4)485,
35(3)325
- Nuseibeh, B.,
32(12)929,
34(1)3
- representation,
26(6)500,
30(3)145,
30(10)707
- requirements,
26(6)541,
26(10)978,
26(12)1122,
27(1)58,
27(7)651,
28(3)286,
28(4)321,
29(8)705,
30(5)328,
31(5)392,
31(7)551,
31(11)969,
32(1)4,
32(4)279,
32(7)433,
34(1)5,
34(1)116,
34(3)377,
34(6)800,
35(5)593
- security,
26(8)702,
34(1)5