[1] شیخان م.، عباسی ع.، «راهکارهای ترکیبی نوین برای تشخیص نفوذ در شبکههای کامپیوتری با استفاده از الگوریتمهای هوش محاسباتی»، مجله محاسبات نرم، جلد 6، شماره 1، ص.48-65، 1396.
[2] برنگی ح.، راجی ف.، خاصه ع.، «تحلیل تحقیقات امنیت و حریم خصوصی حوزه بلاکچین: یک مقاله علم سنجی»، مجله محاسبات نرم، جلد 9، شماره 1، ص.40-55، 1399.
[3] یداللهی ا.، سلیمی سرتختی ج.، گلی بیدگلی س.، «مدلسازی امنیت ماشینهای مجازی در ابر با استفاده از تئوری بازی تکرار شونده»، مجله محاسبات نرم، جلد 10، شماره 1، ص.2-15، 1400.
[4] Villamizar H., Kalinowski M., Viana M., and Fernandez D. M., “A systematic mapping study on security in agile requirements engineering,” In 2018 44th Euromicro conference on software engineering and advanced applications (SEAA), pp. 454-461, IEEE, 2018.
[5] Hlaing S. Z. and Ochimizu k., “An Integrated Cost-Effective Security Requirement Engineering Process in SDLC Using FRAM,” In 2018 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 852-857, IEEE, 2018.
[6] Behutiye W., Karhapaa P., Lopez L., Burgués X., Martinez-Fernandez S., Vollmer A.M., Rodriguez P., Franch X., and Oivo M., “Management of quality requirements in agile and rapid software development: A systematic mapping study,” Information and software technology, 123: 106225, 2020.
[7] Wohlin C., “Guidelines for snowballing in systematic literature studies and a replication in software engineering,” In Proceedings of the 18th international conference on evaluation and assessment in software engineering, pp. 1-10. 2014.
[8] Souag A., Mazo R., Salinesi C., and Comyn-Wattiau I., “Reusable knowledge in security requirements engineering: a systematic mapping study,” Requirements Engineering, 21(2): 251-283, 2016.
[9] Munante D., Chiprianov V., Gallon L., and Aniorté P., “A review of security requirements engineering methods with respect to risk analysis and model-driven engineering,” In International Conference on Availability, Reliability, and Security, pp. 79-93. Springer, Cham, 2014.
[10] ذاکری م.، شمسی م.، «مقایسه روشهای مهندسی نیازمندیهای امنیتی» دومین کنفرانس بینالمللی مدیریت و اقتصاد در قرن 21، 1395.
[11] Mishra A. D. and Mustafa K., “A review on security requirements specification by formal methods,” Concurrency and Computation: Practice and Experience, 34(5): e6702, 2021.
[12] Mustafa N., Kamalrudin M., and Sidek S., “Security requirements template-based approach to improve the writing of complete security requirements,” Journal of Theoretical and Applied Information Technology 99(1), 2021.
[13] Wilhjelm C. and Younis A. A., “A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems,” In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 426-433. IEEE, 2020.
[14] Amershi S., Begel A., Bird C., DeLine R., Gall H., Kamar E., Nagappan N., Nushi B., and Zimmermann T., “Software engineering for machine learning: A case study,” In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), pp. 291-300. IEEE, 2019.
[15] Ishikawa F. and Yoshioka N., “How do engineers perceive difficulties in engineering of machine-learning systems?,” In 6th International Workshop on Software Engineering Research and Industrial Practice (SER&IP), pp. 2-9. IEEE, 2019.
[16] Wan Z., Xia X., Lo D., and Murphy G. C., “How does machine learning change software development practices?,” IEEE Transactions on Software Engineering, 47(9): 1857-1871, 2021.
[17] Mazeika D. and Butleris R., “Integrating security requirements engineering into MBSE: Profile and guidelines,” Security and Communication Networks, 2020.
[18] Hayat B., Shakoor R., Mubarak S., and Basharat K., “A goal based framework by adopting square process for privacy and security requirement engineering,” International Journal of Computer Applications, 169(11): 31-34, 2017.
[19] Li T. and Chen Z., “An ontology-based learning approach for automatically classifying security requirements,” Journal of Systems and Software, 165: 110566, 2020.
[20] Diamantopoulou V. and Mouratidis H. “Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology,” Information and Computer Security, 26(4): 382-400, 2018.
[21] Rouland Q., Hamid B., and Jaskolka J., “Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support,” Journal of Systems Architecture, 117: 102073, 2021.
[22] Mishra A. D. and Mustafa K., “Formalization of Security Requirements-A Case Study on a Web-Based Application,” Journal of Scientific Research, 66(2), 2022.
[23] Olukoya O., “Assessing frameworks for eliciting privacy & security requirements from laws and regulations,” Computers and Security, 117: 102697, 2022.