{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T09:50:53Z","timestamp":1725443453057},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/ssci.2016.7849906","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T17:24:33Z","timestamp":1487265873000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Improving security requirements adequacy"],"prefix":"10.1109","author":[{"given":"Hanan","family":"Hibshi","sequence":"first","affiliation":[]},{"given":"Travis D.","family":"Breaux","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"A brief Tutorial on Interval type-2 fuzzy sets and systems","author":"wu","year":"2010","journal-title":"Fuzzy Sets Syst"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2014.6891548"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2014.2310734"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/T2FZZ.2013.6613298"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345795"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2014.6891534"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/sec.295"},{"key":"ref11","article-title":"Evaluation of Lingiustic Labels Used in Applications","author":"hibshi","year":"2016","journal-title":"Tech Rep"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320417"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1093\/cybsec\/tyw010","article-title":"A Grounded Analysis of Experts' Decision-Making during Security Assessments","author":"hibshi","year":"2016","journal-title":"Cybersecurity"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X"},{"journal-title":"Uncertain Rule-Based Fuzzy Logic Systems Introduction and New Directions","year":"2001","author":"mendel","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2007.380672"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/001316444700700201"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/9780470599655"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1126\/science.185.4157.1124"},{"year":"2014","key":"ref4","article-title":"Cisco 2014 Annual Security Report"},{"journal-title":"Demand to fill cybersecurity jobs booming","year":"2015","author":"setalvad","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/cae.20522"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-35813-5_9","article-title":"Uncertainty in self-adaptive software systems","author":"esfahani","year":"2013","journal-title":"Soft Engr for Self-Adaptive Sys II"},{"journal-title":"Information Security Analysts Occupational Outlook Handbook U S Bureau of Labor Statistics","year":"0","key":"ref29"},{"journal-title":"Theories of Memory","year":"1993","author":"collins","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4135\/9781446287866"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2002.1018103"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320413"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882389"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/cae.20138"},{"journal-title":"Turnaround and transformation in cybersecurity Key findings from The Global State of Information Security Survey 2016","year":"2016","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RESS.2011.6043924"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(96)00008-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.02.013"},{"journal-title":"Experimental and Quasi-Experimental Designs for Generalized Causal Inference","year":"2002","author":"shadish","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2002.1018052"}],"event":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2016,12,6]]},"location":"Athens, Greece","end":{"date-parts":[[2016,12,9]]}},"container-title":["2016 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840087\/7849361\/07849906.pdf?arnumber=7849906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T15:56:45Z","timestamp":1568822205000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7849906\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/ssci.2016.7849906","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}