Article
Artifacts of `Detecting Software Vulnerabilities via Requirements Dependency Analysis' Open Access Deposited
Date Modified: 07/13/2019
Please find within this study package the following items.
Contact anonymously.submit@gmail.com for further information or questions. Thanks!
- Creator
- License
- Submitter
- College
- Department
- Publisher
Digital Object Identifier (DOI)
Identifier: doi:10.7945/q8h2-t712
Link: https://doi.org/10.7945/q8h2-t712
This DOI link is the best way for others to cite your work.
Items
Thumbnail | Title | Date Uploaded | Visibility | Actions |
---|---|---|---|---|
|
00._README.png | 2019-07-13 | Open Access |
|
|
01._High-level_security_requirements_and_dependencies_in_HIPAA.pdf | 2019-07-13 | Open Access |
|
|
02._High-level_security_requirements_and_dependencies_in_FIPS_200.pdf | 2019-07-13 | Open Access |
|
|
03._Low-level_security_requirements_and_dependenices_in_CARE2X.pdf | 2019-07-13 | Open Access |
|
|
04._Low-level_security_requirements_and_dependencies_in_iTrust.pdf | 2019-07-13 | Open Access |
|
|
05._Low-level_security_requirements_and_dependencies_in_WorldVisitA.pdf | 2019-07-13 | Open Access |
|
|
06._Low-level_security_requirements_and_dependencies_in_Scholar_UC.pdf | 2019-07-13 | Open Access |
|
|
07._Low-level_security_requirements_and_dependencies_in_Moodle.pdf | 2019-07-13 | Open Access |
|
Permanent link to this page: https://scholar.uc.edu/show/2227mq88z