Proceedings of the 18th International Conference on Predictive Models and Data Analytics in Software Engineering 2022
DOI: 10.1145/3558489.3559074
|View full text |Cite
|
Sign up to set email alerts
|

Identifying security-related requirements in regulatory documents based on cross-project classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 13 publications
0
0
0
Order By: Relevance
“…Conversely, Articles [125] and [26] explore the role of ML in the e cient synthesis and documentation of security requirements. Article [125] introduces a classi er that streamlines the extraction and categorization of security-related requirements from extensive regulatory documents, signi cantly reducing the manual effort required for compliance in regulated sectors such as the automotive industry.…”
Section: Security Requirement Elicitationmentioning
confidence: 99%
See 1 more Smart Citation
“…Conversely, Articles [125] and [26] explore the role of ML in the e cient synthesis and documentation of security requirements. Article [125] introduces a classi er that streamlines the extraction and categorization of security-related requirements from extensive regulatory documents, signi cantly reducing the manual effort required for compliance in regulated sectors such as the automotive industry.…”
Section: Security Requirement Elicitationmentioning
confidence: 99%
“…Conversely, Articles [125] and [26] explore the role of ML in the e cient synthesis and documentation of security requirements. Article [125] introduces a classi er that streamlines the extraction and categorization of security-related requirements from extensive regulatory documents, signi cantly reducing the manual effort required for compliance in regulated sectors such as the automotive industry. Article [26] presents a hybrid approach combining ML and a rule-based expert system to predict security functional requirements and evaluation assurance levels for ICT products based on the Common Criteria (CC) framework.…”
Section: Security Requirement Elicitationmentioning
confidence: 99%