Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security requirements engineering (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/141)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Security requirements elicitation from airline turnaround processes
Matulevičius, Raimundas
;
Norta, Alexander
;
Samarütel, Silver
Business & information systems engineering : BISE ; the international journal of wirtschaftsinformatik
2018
/
p. 3-20 : ill
https://doi.org/10.1007/s12599-018-0518-4
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
139
1.
security requirements engineering
2.
security requirements
3.
requirements engineering
4.
cybersecurity knowledge requirements
5.
energy performance minimum requirements
6.
functional requirements
7.
grid connection requirements
8.
isolation requirements
9.
min. requirements
10.
minimum requirements
11.
national requirements
12.
nZEB requirements
13.
nutrient requirements
14.
ontology requirements
15.
requirements
16.
requirements bazaar
17.
requirements elicitation
18.
requirements feedback
19.
requirements gathering
20.
requirements modelling
21.
User Requirements
22.
ad-hoc sensor networks security
23.
Automatic Security Verification
24.
Blockchain security
25.
cache security
26.
communication system security
27.
comprehensive system of economic security
28.
computer security
29.
cooperative security dilemma
30.
cyber security
31.
cyber security education
32.
cyber security exercises
33.
cyber security monitoring
34.
cyber security strategies
35.
cyber-security
36.
data and information security
37.
data security
38.
development of security cameras
39.
digital security practices
40.
drinking water security
41.
economic security
42.
economic security of enterprise
43.
emotional security
44.
energy security
45.
energy security indicator
46.
Estonian information security standard
47.
graded security
48.
hardware security
49.
hardware security primitive
50.
high level of security
51.
Homeland security
52.
human security
53.
information security
54.
information security and privacy
55.
initial level of security
56.
internal security
57.
international security
58.
investment and innovation security
59.
IPv6 security
60.
IT security
61.
IT security management
62.
job security
63.
long-term security
64.
maritime cyber security
65.
maritime cyber security operations centers
66.
Maritime Security Operations Center (M-SOC)
67.
medium level of security
68.
metadata model for security measures
69.
Middle Eastern security
70.
Mobile security
71.
national cyber security strategy
72.
national security
73.
NATO. Science for Peace and Security Program
74.
network security
75.
network security monitoring
76.
OSCE (Organization for Security and Co-operation in Europe)
77.
passenger’s security
78.
policy-based routing security
79.
political and security cultures
80.
post-quantum security
81.
power system security
82.
quantitative security
83.
regional security
84.
RISC-V Security Verification
85.
Safety and Security in Sea Transportation
86.
safety and security testing
87.
security
88.
security adaptation
89.
security alert prioritization
90.
security analysis
91.
security and justice (AFSJ)
92.
Security and political science
93.
security and privacy
94.
security and privacy in smart grids
95.
Security Assertion Mining
96.
security closure
97.
Security Coverage
98.
security dataset
99.
security dilemma
100.
Security evaluation
101.
security evaluation instruments
102.
Security limitations
103.
security log analysis
104.
security management
105.
security model
106.
security monitoring
107.
security notion
108.
security objectives
109.
security of data
110.
security of supply
111.
security operation center
112.
security operations center
113.
security patterns
114.
security policy
115.
security problem definition
116.
security proof
117.
security protocols
118.
security research
119.
security risk assessment
120.
security risk management
121.
security risks
122.
security science and technology
123.
security strategies
124.
security systems for military objects
125.
security testing
126.
security training
127.
security verification
128.
security-by-design
129.
social security planning
130.
societal security
131.
software security
132.
software security level
133.
software security subcharacteristics
134.
sufficient level of security
135.
system of economic security
136.
system security
137.
terrorism security
138.
transmission System Security
139.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT