Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security requirements engineering (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/145)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Security requirements elicitation from airline turnaround processes
Matulevičius, Raimundas
;
Norta, Alexander
;
Samarütel, Silver
Business & information systems engineering : BISE ; the international journal of wirtschaftsinformatik
2018
/
p. 3-20 : ill
https://doi.org/10.1007/s12599-018-0518-4
Journal metrics at Scopus
Article at Scopus
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
143
1.
security requirements engineering
2.
security requirements
3.
requirements engineering
4.
cybersecurity knowledge requirements
5.
energy performance minimum requirements
6.
functional requirements
7.
grid connection requirements
8.
industrial IT requirements
9.
isolation requirements
10.
min. requirements
11.
minimum requirements
12.
national requirements
13.
nZEB requirements
14.
nutrient requirements
15.
ontology requirements
16.
requirements
17.
requirements bazaar
18.
requirements elicitation
19.
requirements feedback
20.
requirements gathering
21.
requirements modelling
22.
User Requirements
23.
ad-hoc sensor networks security
24.
Automatic Security Verification
25.
Blockchain security
26.
cache security
27.
cloud security
28.
communication system security
29.
comprehensive system of economic security
30.
computer security
31.
cooperative security dilemma
32.
cyber security
33.
cyber security education
34.
cyber security exercises
35.
cyber security monitoring
36.
cyber security strategies
37.
cyber-security
38.
data and information security
39.
data security
40.
development of security cameras
41.
digital security practices
42.
drinking water security
43.
economic security
44.
economic security of enterprise
45.
emotional security
46.
energy security
47.
energy security indicator
48.
Estonian information security standard
49.
graded security
50.
hardware security
51.
hardware security primitive
52.
high level of security
53.
Homeland security
54.
human security
55.
information security
56.
information security and privacy
57.
initial level of security
58.
internal security
59.
international security
60.
investment and innovation security
61.
IPv6 security
62.
IT security
63.
IT security management
64.
job security
65.
long-term security
66.
maritime cyber security
67.
maritime cyber security operations centers
68.
Maritime Security Operations Center (M-SOC)
69.
medium level of security
70.
metadata model for security measures
71.
Middle Eastern security
72.
Mobile security
73.
national cyber security strategy
74.
national security
75.
NATO. Science for Peace and Security Program
76.
network security
77.
network security monitoring
78.
OSCE (Organization for Security and Co-operation in Europe)
79.
passenger’s security
80.
policy-based routing security
81.
political and security cultures
82.
post-quantum security
83.
power system security
84.
quantitative security
85.
regional security
86.
RISC-V Security Verification
87.
Safety and Security in Sea Transportation
88.
safety and security testing
89.
security
90.
security adaptation
91.
security alert prioritization
92.
security analysis
93.
security and justice (AFSJ)
94.
Security and political science
95.
security and privacy
96.
security and privacy in smart grids
97.
Security Assertion
98.
Security Assertion Mining
99.
security closure
100.
Security Coverage
101.
security dataset
102.
security dilemma
103.
Security evaluation
104.
security evaluation instruments
105.
Security Level Evaluation
106.
Security limitations
107.
security log analysis
108.
security management
109.
security model
110.
security monitoring
111.
security notion
112.
security objectives
113.
security of data
114.
security of supply
115.
security operation center
116.
security operations center
117.
security patterns
118.
security policy
119.
security problem definition
120.
security proof
121.
security protocols
122.
security research
123.
security risk assessment
124.
security risk management
125.
security risks
126.
security science and technology
127.
security strategies
128.
security systems for military objects
129.
security testing
130.
security training
131.
security verification
132.
security-by-design
133.
social security planning
134.
societal security
135.
software security
136.
software security level
137.
software security subcharacteristics
138.
sufficient level of security
139.
system of economic security
140.
system security
141.
terrorism security
142.
transmission System Security
143.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT