As the trend to use the latestmachine learning models to automate requirements engineering processes continues,security requirements classification is tuning into the most researched field in the software engineering ...
详细信息
As the trend to use the latestmachine learning models to automate requirements engineering processes continues,security requirements classification is tuning into the most researched field in the software engineering *** literature studies have proposed numerousmodels for the classification of security ***,adopting those models is constrained due to the lack of essential datasets permitting the repetition and generalization of studies employing more advanced machine learning ***,most of the researchers focus only on the classification of requirements with security *** did not consider other nonfunctional requirements(NFR)directly or indirectly related to *** has been identified as a significant research gap in security requirements *** major objective of this study is to propose a security requirements classification model that categorizes security and other relevant security *** use PROMISE_exp and DOSSPRE,the two most commonly used datasets in the software engineering *** proposed methodology consists of two *** the first step,we analyze all the nonfunctional requirements and their relation with security *** found 10 NFRs that have a strong relationship with security *** the second step,we categorize those NFRs in the security requirements *** proposedmethodology is a hybridmodel based on the ConvolutionalNeural Network(CNN)and Extreme Gradient Boosting(XGBoost)***,we evaluate the model by updating the requirement type column with a binary classification column in the dataset to classify the requirements into security and non-security *** performance is evaluated using four metrics:recall,precision,accuracy,and F1 Score with 20 and 28 epochs number and batch size of 32 for PROMISE_exp and DOSSPRE datasets and achieved 87.3%and 85.3%accuracy,*** proposed study shows an enhancement in metrics
Since the list update problem was applied to data compression as an effective encoding technique, numerous deterministic algorithms have been studied and analyzed. A powerful strategy, Move-to-Front (MTF), involves mo...
详细信息
Game theory-based models and design tools have gained substantial prominence for controlling and optimizing behavior within distributed engineering systems due to the inherent distribution of decisions among individua...
详细信息
Trained Artificial Intelligence (AI) models are challenging to install on edge devices as they are low in memory and computational power. Pruned AI (PAI) models are therefore needed with minimal degradation in perform...
详细信息
This paper focuses on the privacy-preserving security control issue for cyber-physical systems (CPSs) via an encoding-decoding communication scheme (EDCS). To considerably contemplate the delayed data acquisition and ...
详细信息
The success of deep neural networks can largely be attributed to large-scale datasets with accurate annotations. In many practical applications, labels are annotated by multiple annotators, resulting in ambiguous labe...
详细信息
This research allows the secure surveillance approach for the Internet of Things (IoT) methodology to be developed by integrating wireless signalling and image encryption strategy. Since the Cloud Service Telco (CST) ...
详细信息
Due to network operation and maintenance relying heavily on network traffic monitoring, traffic matrix analysis has been one of the most crucial issues for network management related tasks. However, it is challenging ...
详细信息
Large language Models (LLMs) have immense potential to enhance the capabilities of Cyber-Physical-Social Intelligence (CPSI) systems, enabling them to better engage with complex cyber, physical, and social environment...
详细信息
暂无评论