Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Get journal articles
Get journal articles
Profiles
My profile
My library
Hanan Hibshi
Carnegie Mellon University
Verified email at andrew.cmu.edu
Cited by 612
Usable Security
Expert Decision-making
Cybersecurity Education
Security Requirements
Privacy
Nabil LAOUFI
Phd Computer science
Cited by 231
Big data
security Requirements
Risk analysis
Damjan Fujs
University of Ljubljana, Faculty of Computer and Information Science
Verified email at fri.uni-lj.si
Cited by 174
cyber security
information systems
software development methodology
security requirements
Anderson Jefferson Cerqueira
University of Brasilia
Verified email at aluno.unb.br
Cited by 105
Software Engineering
Sofware Requirements
Privacy Requirements
Security Requirements
JAVED AHMAD
Jamia Millia Islamia
Verified email at jmi.ac.in
Cited by 85
Software Engineering
Security Requirements
Fuzzy Logic
Requirements Engineering
Malik Nadeem Anwar
Researcher in computer science at JMI New Delhi
Verified email at st.jmi.ac.in
Cited by 84
Software Engineering
Software Security
Requirements Engineering
Security Requirements
Privacy
Terms
Help
About Scholar
Search help