Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis

Wentao Wang, Faryn Dumont, Nan Niu, Glen Horton

Research output: Contribution to journalArticlepeer-review

Original languageEnglish
Pages (from-to)1665-1675
Number of pages11
JournalIEEE Transactions on Software Engineering
Volume48
Issue number5
DOIs
StatePublished - May 1 2022
Externally publishedYes

ASJC Scopus Subject Areas

  • Software

Keywords

  • Security requirements
  • requirements dependency management
  • requirements traceability
  • vulnerability discovery

Cite this