{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:27:32Z","timestamp":1729675652405,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/re.2017.79","type":"proceedings-article","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T16:22:47Z","timestamp":1506356567000},"page":"506-511","source":"Crossref","is-referenced-by-count":9,"title":["A Domain-Independent Model for Identifying Security Requirements"],"prefix":"10.1109","author":[{"given":"Nuthan","family":"Munaiah","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Meneely","sequence":"additional","affiliation":[]},{"given":"Pradeep K.","family":"Murukannaiah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1017\/S026988891300043X"},{"journal-title":"US-CERT\/NIST","article-title":"NVD-CVE-2015-6765","year":"0","key":"ref11"},{"journal-title":"MITRE","article-title":"CWE-CWE-416: Use After Free (2.10)","year":"0","key":"ref12"},{"journal-title":"CWE-CWE List Version 2 10","year":"0","author":"khan","key":"ref13"},{"journal-title":"Electronic Purse Specification (ePurse)","year":"0","author":"knauss","key":"ref14"},{"journal-title":"sklearn feature_extraction text TfidfVectorizer-scikit-learn 0 18 1 Documentation","year":"0","author":"pedregosa","key":"ref15"},{"key":"ref16","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"journal-title":"sklearn svm OneClassSVM-scikit-learn 0 18 1 Documentation","year":"0","author":"pedregosa","key":"ref17"},{"key":"ref18","first-page":"281","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"bergstra","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"ref3","first-page":"4:1","article-title":"Analyzing security requirements as relationships among strategic actors","author":"liu","year":"2002","journal-title":"Proceeding of Symposium on Requirements Engineering for Information Security"},{"journal-title":"Global Platform Specification (GPS)","year":"0","author":"knauss","key":"ref6"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/978-3-642-19858-8_2","article-title":"Supporting requirements engineers in recognising security issues","author":"knauss","year":"2011","journal-title":"Proceedings of the 15th International Working Conference on Requirements Engineering Foundation for Software Quality"},{"journal-title":"MITRE","article-title":"Common Weakness Enumeration: A community-developed list of software weakness types","year":"0","key":"ref8"},{"journal-title":"Customer Premises Network (CPN) Specification","year":"0","author":"knauss","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0092-x"},{"journal-title":"CWE-CWE-347 Improper Verification of Cryptographic Signature (2 11)","year":"0","author":"knauss","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-015-0220-8"},{"key":"ref20","first-page":"188","author":"khan","year":"2010","journal-title":"A Survey of Recent Trends in One Class Classification"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912267"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.65"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2005.14"},{"key":"ref23","first-page":"190","author":"cybulski","year":"2000","journal-title":"Requirements Classification and Reuse Crossing Domain Boundaries"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-007-0045-1"}],"event":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","start":{"date-parts":[[2017,9,4]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 IEEE 25th International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8048783\/8048874\/08049174.pdf?arnumber=8049174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T19:27:37Z","timestamp":1570130857000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8049174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/re.2017.79","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}