- Methods
Opportunities & Approaches
Showing 7 articles tagged with AI, Reuse or Security
Title | Topic | Author | Date | Reading time |
---|---|---|---|---|
Opportunities & ApproachesRe-Use of Requirements via Libraries:Opportunities & Approaches |
Methods
|
30.04.2014 | 9 minutes | |
AI Assistants in Requirements Engineering | Part 1Introduction and Concepts |
Practice
Cross-discipline
|
12.12.2024 | 15 minutes | |
AI Assistants in Requirements Engineering | Part 2Implementation and Future Trends |
Practice
Cross-discipline
|
28.01.2025 | 21 minutes | |
Cyber Security Requirements EngineeringHands-on guidance for developing and managing security requirements |
Practice
Methods
|
29.10.2015 | 14 minutes | |
Building in security instead of testing it inEliciting security requirements needs a different process |
Practice
|
30.04.2015 | 14 minutes | |
Mission PossibleConcept for the successful handling of integral NFRs in Scaled Agile Environments. |
Practice
Cross-discipline
|
14.12.2022 | 11 minutes | |
Requirements ReuseRequirements Reuse with the PABRE Framework |
Studies and Research
|
30.01.2014 | 22 minutes |