Ontologies for security requirements: A literature survey and classification A Souag, C Salinesi, I Comyn-Wattiau Advanced Information Systems Engineering Workshops: CAiSE 2012 International …, 2012 | 125 | 2012 |
A security ontology for security requirements elicitation A Souag, C Salinesi, R Mazo, I Comyn-Wattiau Engineering Secure Software and Systems: 7th International Symposium, ESSoS …, 2015 | 95 | 2015 |
Reusable knowledge in security requirements engineering: a systematic mapping study A Souag, R Mazo, C Salinesi, I Comyn-Wattiau Requirements Engineering 21, 251-283, 2016 | 94 | 2016 |
Using security and domain ontologies for security requirements analysis A Souag, C Salinesi, I Wattiau, H Mouratidis 2013 IEEE 37th Annual Computer Software and Applications Conference …, 2013 | 44 | 2013 |
Using the AMAN-DA method to generate security requirements: a case study in the maritime domain A Souag, R Mazo, C Salinesi, I Comyn-Wattiau Requirements Engineering 23 (4), 557-580, 2018 | 21 | 2018 |
Towards a new generation of security requirements definition methodology using ontologies A Souag 24th International Conference on Advanced Information Systems Engineering …, 2012 | 15 | 2012 |
Vers une nouvelle génération de définition des exigences de sécurité fondée sur l'utilisation des ontologies A Souag INFORSID 2012, 583-590, 2012 | 4 | 2012 |
Security requirements analysis based on security and domain ontologies A Souag, C Salinesi, I Wattiau REFSQ, 1-3, 2013 | 1 | 2013 |
Cancer: Investigating the impact of the implementation platform on machine learning models A Olowolayemo, A Souag, K Sirlantzis AIHealth 2024, The First International Conference on AI-Health, 2024 | | 2024 |
AMAN-DA: Une approche basée sur la réutilisation de la connaissance pour l’ingénierie des exigences de sécurité A Souag Paris 1, 2015 | | 2015 |
AMAN-DA: A knowledge reuse based approach for domain specific security requirements engineering A Souag Université Paris 1 Panthéon Sorbonne, 2015 | | 2015 |
A Methodology for Defining Security Requirements using Security and Domain Ontologies A Souag, C Salinesi, IC Wattiau INSIGHT 16 (4), 14-16, 2013 | | 2013 |
Une méthode de définition des exigences de sécurité fondée sur l'utilisation des ontologies. A Souag Séminaire Doctoral du Forum Académie-Industrie de l'AFIS., 2012 | | 2012 |