{"id":"https://openalex.org/W2743400340","doi":"https://doi.org/10.18293/seke2017-040","title":"Automated Software Security Requirements Recommendation Based on FT-SR Model","display_name":"Automated Software Security Requirements Recommendation Based on FT-SR Model","publication_year":2017,"publication_date":"2017-07-05","ids":{"openalex":"https://openalex.org/W2743400340","doi":"https://doi.org/10.18293/seke2017-040","mag":"2743400340"},"language":"en","primary_location":{"id":"doi:10.18293/seke2017-040","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2017-040","pdf_url":"https://doi.org/10.18293/seke2017-040","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.18293/seke2017-040","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089922995","display_name":"Jiangjuan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I132369690","display_name":"Tianjin University of Science and Technology","ror":"https://ror.org/018rbtf37","country_code":"CN","type":"education","lineage":["https://openalex.org/I132369690"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiangjuan Wang","raw_affiliation_strings":["School of Computer Science and Technology, Tianjin University,","Tianjin Key Laboratory of Advanced Networking, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Tianjin University,","institution_ids":["https://openalex.org/I132369690"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking, Tianjin, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100606153","display_name":"Xiaohong Li","orcid":"https://orcid.org/0000-0002-6479-831X"},"institutions":[{"id":"https://openalex.org/I132369690","display_name":"Tianjin University of Science and Technology","ror":"https://ror.org/018rbtf37","country_code":"CN","type":"education","lineage":["https://openalex.org/I132369690"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Li","raw_affiliation_strings":["School of Computer Science and Technology, Tianjin University,","Tianjin Key Laboratory of Advanced Networking, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Tianjin University,","institution_ids":["https://openalex.org/I132369690"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking, Tianjin, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001714538","display_name":"Zhiyong Feng","orcid":"https://orcid.org/0000-0001-5322-222X"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyong Feng","raw_affiliation_strings":["School of Computer Software, Tianjin University,","Tianjin Key Laboratory of Advanced Networking, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Software, Tianjin University,","institution_ids":["https://openalex.org/I162868743"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking, Tianjin, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045895968","display_name":"Jianye Hao","orcid":null},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianye Hao","raw_affiliation_strings":["School of Computer Software, Tianjin University,","Tianjin Key Laboratory of Advanced Networking, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Software, Tianjin University,","institution_ids":["https://openalex.org/I162868743"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking, Tianjin, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040791046","display_name":"Guangquan Xu","orcid":"https://orcid.org/0000-0001-8701-3944"},"institutions":[{"id":"https://openalex.org/I132369690","display_name":"Tianjin University of Science and Technology","ror":"https://ror.org/018rbtf37","country_code":"CN","type":"education","lineage":["https://openalex.org/I132369690"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangquan Xu","raw_affiliation_strings":["School of Computer Science and Technology, Tianjin University,","Tianjin Key Laboratory of Advanced Networking, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Tianjin University,","institution_ids":["https://openalex.org/I132369690"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking, Tianjin, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050983165","display_name":"Zhuobing Han","orcid":null},"institutions":[{"id":"https://openalex.org/I132369690","display_name":"Tianjin University of Science and Technology","ror":"https://ror.org/018rbtf37","country_code":"CN","type":"education","lineage":["https://openalex.org/I132369690"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuobing Han","raw_affiliation_strings":["School of Computer Science and Technology, Tianjin University,","Tianjin Key Laboratory of Advanced Networking, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Tianjin University,","institution_ids":["https://openalex.org/I132369690"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking, Tianjin, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5089922995"],"corresponding_institution_ids":["https://openalex.org/I132369690"],"apc_list":null,"apc_paid":null,"fwci":0.3731,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.57508684,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"2017","issue":null,"first_page":"382","last_page":"385"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7326405644416809},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5415880680084229},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4824586510658264},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46634241938591003},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33406034111976624},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.24285808205604553},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18444252014160156},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.13891437649726868}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7326405644416809},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5415880680084229},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4824586510658264},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46634241938591003},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33406034111976624},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.24285808205604553},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18444252014160156},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.13891437649726868}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/seke2017-040","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2017-040","pdf_url":"https://doi.org/10.18293/seke2017-040","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18293/seke2017-040","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2017-040","pdf_url":"https://doi.org/10.18293/seke2017-040","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G216829291","display_name":null,"funder_award_id":"61572349, 61272106","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5698035823","display_name":null,"funder_award_id":"61572349","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6644189690","display_name":null,"funder_award_id":"61272106","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2743400340.pdf","grobid_xml":"https://content.openalex.org/works/W2743400340.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W1589188624","https://openalex.org/W1606773397","https://openalex.org/W1981028474","https://openalex.org/W1987380569","https://openalex.org/W2119259807","https://openalex.org/W2147733013","https://openalex.org/W2153177282","https://openalex.org/W2414972958","https://openalex.org/W2522976719","https://openalex.org/W3161918289","https://openalex.org/W6635134227"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Since":[0],"security":[1,17,40],"is":[2,19,43,65,113,127,150],"recommended":[3,191],"to":[4,29,67,115,152],"be":[5],"evaluated":[6],"at":[7],"the":[8,11,30,73,131,157,183,194],"beginning":[9],"of":[10,50,53,99,170,190,196,204],"software":[12,16,39,69,76,82,106,161,173],"development":[13],"process,":[14],"specifying":[15],"requirements":[18,41],"inevitable":[20],"in":[21,90,143],"developing":[22],"Critical":[23],"Information":[24],"Security":[25,83],"Systems.":[26],"However,":[27],"according":[28],"ISO/IEC":[31,93],"15408":[32],"(known":[33],"as":[34],"Common":[35,177],"Criteria),":[36],"determining":[37],"detailed":[38],"(SRs)":[42],"quite":[44],"challenging,":[45],"complex":[46],"which":[47,86,139],"needs":[48],"lots":[49],"expert":[51],"knowledge":[52,203],"security.":[54,205],"In":[55],"this":[56],"paper,":[57],"a":[58,124,147,188],"data-driven":[59],"Functionality":[60],"Topic-Security":[61],"Requirement":[62],"(FT-SR)":[63],"model":[64,126,159],"proposed":[66,151,184],"recommend":[68,153],"SRs":[70,80,103,138,154,192,197],"based":[71,129,155],"on":[72,130,156,167],"relationship":[74],"between":[75,133],"functionality":[77,100,117,121,135],"specification":[78],"and":[79,101,137],"from":[81,105],"Target":[84],"(ST)":[85],"have":[87,140],"been":[88,141],"written":[89],"accordance":[91],"with":[92],"15408.":[94],"First,":[95],"we":[96],"extract":[97],"descriptions":[98],"tag":[102],"all":[104],"STs.":[107],"Second,":[108],"Latent":[109],"Dirichlet":[110],"Allocation":[111],"(LDA)":[112],"adopted":[114],"build":[116],"topics":[118,136],"for":[119,160,200],"product":[120,134],"description.":[122],"Third,":[123],"FT-SR":[125,158],"developed":[128],"mapping":[132],"tagged":[142],"ST":[144,168],"documents.":[145],"Finally,":[146],"recommendation":[148],"strategy":[149],"products.":[162],"Our":[163],"experiments":[164],"are":[165],"performed":[166],"documents":[169],"over":[171],"600":[172],"products":[174],"provided":[175],"by":[176],"Criteria.":[178],"Experimental":[179],"results":[180],"show":[181],"that":[182],"approach":[185],"can":[186],"generate":[187],"set":[189],"reducing":[193],"difficulty":[195],"recommending":[198],"even":[199],"people":[201],"lack":[202]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
