Requirements analysis

Known as: Requirement gathering, Requirements modeling, Software requirements analysis 
Requirements analysis in systems engineering and software engineering, encompasses those tasks that go into determining the needs or conditions to… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1970-2018
010020030019702018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2008
Highly Cited
2008
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Security issues for software systems ultimately concern relationships among social actors stakeholders, system users, potential… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Early requirements analysis is concerned with modeling and understanding the organizational context within which a software… (More)
  • figure 1
  • figure 4
  • figure 6
  • figure 7
  • figure 8
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper presents an extended version of GoalOriented Requirements Analysis Method called AGORA, where attribute values, e.g… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
0 7 4 0 7 4 5 9 / 0 0 / $ 1 0 . 0 0 © 2 0 0 1 I E E E While such techniques1 form the foundation for many contemporary software… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
were proposed more than 10 years ago. The Object-Oriented Systems Analysis (OOSA) technique [12] adopts the Entity-Relationship… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1994
Highly Cited
1994
This approach emphasizes pinpointing where and when information needs occur; at its core is the inquiry cycle model, a structure… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1990
Highly Cited
1990
N-fold inspection uses traditional inspections of the user requirements document (URD) but replicates the inspection activities… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
1977
Highly Cited
1977
Requirements definition encompasses all aspects of system development prior to actual system design. We see the lack of an… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?