2004
DOI: 10.1007/978-3-540-30134-9_17
|View full text |Cite
|
Sign up to set email alerts
|

Security Requirements for Software Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…If the TCCD of the candidate set is less than that of the linking set minus the calibration error threshold, that is, TCCD candidate set < TCCD linking set − error threshold, the linking set is replaced by the candidate set; otherwise the linking set remains unchanged. (4) Update I 4 by performing linking between I 1 and I 3 using the updated linking set using STUIRT (Kim & Kolen, 2004). L, R, and remaining set are also updated.…”
Section: Remove Stepmentioning
confidence: 99%
See 1 more Smart Citation
“…If the TCCD of the candidate set is less than that of the linking set minus the calibration error threshold, that is, TCCD candidate set < TCCD linking set − error threshold, the linking set is replaced by the candidate set; otherwise the linking set remains unchanged. (4) Update I 4 by performing linking between I 1 and I 3 using the updated linking set using STUIRT (Kim & Kolen, 2004). L, R, and remaining set are also updated.…”
Section: Remove Stepmentioning
confidence: 99%
“…IPD detection. I 1 and I 3 were linked to generate I 4 using the Stocking-Lord test characteristic curve method (Stocking & Lord, 1983) via the computer program STUIRT (Kim & Kolen, 2004). After initial linking using all common items, different methods were implemented to detect IPD by comparing I 1 and I 4 .…”
Section: Ipd Simulationmentioning
confidence: 99%