TY - JOUR
T1 - Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis
AU - Wang, Wentao
AU - Dumont, Faryn
AU - Niu, Nan
AU - Horton, Glen
N1 - Publisher Copyright:
© 1976-2012 IEEE.
PY - 2022/5/1
Y1 - 2022/5/1
KW - Security requirements
KW - requirements dependency management
KW - requirements traceability
KW - vulnerability discovery
UR - https://www.scopus.com/pages/publications/85130785555
UR - https://www.scopus.com/inward/citedby.url?scp=85130785555&partnerID=8YFLogxK
U2 - 10.1109/TSE.2020.3030745
DO - 10.1109/TSE.2020.3030745
M3 - Article
AN - SCOPUS:85130785555
SN - 0098-5589
VL - 48
SP - 1665
EP - 1675
JO - IEEE Transactions on Software Engineering
JF - IEEE Transactions on Software Engineering
IS - 5
ER -