Tong Li (李童)
Cited by
Cited by
Goal-oriented requirements engineering: an extended systematic mapping study
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, L Piras, ...
Requirements Engineering 24 (2), 133-160, 2019
Designing IT systems according to environmental settings: a strategic analysis framework
H Zhang, L Liu, T Li
The Journal of Strategic Information Systems 20 (1), 80-95, 2011
Goal-oriented requirements engineering: a systematic literature map
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 106-115, 2016
Why Requirements Engineering Fails: A Survey Report from China
L Liu, T Li, F Peng
Requirements Engineering Conference (RE), 2010 18th IEEE International, 317-322, 2010
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)
A Yasin, L Liu, T Li, J Wang, D Zowghi
Information and Software Technology 95, 179-200, 2018
Taking Goal Models Downstream: A Systematic Roadmap
J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos, ...
RCIS 2014, 2014
Dealing with security requirements for socio-technical systems: A holistic approach
T Li, J Horkoff
International Conference on Advanced Information Systems Engineering, 285-300, 2014
Security requirements engineering in the wild: A survey of common practices
G Elahi, E Yu, T Li, L Liu
Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th …, 2011
Security Attack Analysis Using Attack Patterns
T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers
Using Goal Models Downstream: A Systematic Roadmap and Literature Review
J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos
International Journal of Information System Modeling and Design (IJISMD) 6 …, 2015
Integrating security patterns with security requirements analysis using contextual goal models
T Li, J Horkoff, J Mylopoulos
IFIP Working Conference on The Practice of Enterprise Modeling, 208-223, 2014
Improving software security awareness using a serious game
A Yasin, L Liu, T Li, R Fatima, W Jianmin
IET Software 13 (2), 159-169, 2019
Holistic security requirements analysis for socio-technical systems
T Li, J Horkoff, J Mylopoulos
Software & Systems Modeling 17 (4), 1253-1285, 2018
Evaluating Modeling Languages: An Example from the Requirements Domain
J Horkoff, FB Aydemir, FL Li, T Li, J Mylopoulos
Conceptual Modeling (ER'14), 2014
Computer aided threat identification
Y Asnar, T Li, F Massacci, F Paci
2011 IEEE 13th Conference on Commerce and Enterprise Computing, 145-152, 2011
Goal-oriented requirements modelling for running systems
YS Jian, T Li, L Liu, E Yu
2010 First International Workshop on Requirements@ Run. Time, 1-8, 2010
An Outlier Detection Approach Based on Improved Self-Organizing Feature Map Clustering Algorithm
P Yang, D Wang, Z Wei, X Du, T Li
IEEE Access 7, 115914-115925, 2019
Sentiment Classification Based on Information Geometry and Deep Belief Networks
M Wang, ZH Ning, C Xiao, T Li
IEEE Access 6, 35206-35213, 2018
Service security analysis based on i*: An approach from the attacker viewpoint
T Li, L Liu, G Elahi, E Yu, BR Bryant
2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010
NFRfinder: a knowledge based strategy for mining non-functional requirements
RLQ Portugal, T Li, L Silva, E Almentero, JCS do Prado Leite
Proceedings of the XXXII Brazilian Symposium on Software Engineering, 102-111, 2018
The system can't perform the operation now. Try again later.
Articles 1–20