Standard

Natural Language Processing with Machine Learning for Security Requirements Analysis: Practical Approaches. / Sadovykh, Andrey; Yakovlev, Kirill; Naumchev, Alexandr и др.

CyberSecurity in a DevOps Environment: From Requirements to Monitoring. ред. / Andrey Sadovykh; Dragos Truscan; Wissam Mallouli; Ana Rosa Cavalli; Cristina Seceleanu; Alessandra Bagnato. Springer, 2023. стр. 35-63 Chapter 2 (CyberSecurity in a DevOps Environment: From Requirements to Monitoring).

Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференцийглава/разделнаучнаяРецензирование

Harvard

Sadovykh, A, Yakovlev, K, Naumchev, A & Ivanov, V 2023, Natural Language Processing with Machine Learning for Security Requirements Analysis: Practical Approaches. в A Sadovykh, D Truscan, W Mallouli, AR Cavalli, C Seceleanu & A Bagnato (ред.), CyberSecurity in a DevOps Environment: From Requirements to Monitoring., Chapter 2, CyberSecurity in a DevOps Environment: From Requirements to Monitoring, Springer, стр. 35-63. https://doi.org/10.1007/978-3-031-42212-6_2

APA

Sadovykh, A., Yakovlev, K., Naumchev, A., & Ivanov, V. (2023). Natural Language Processing with Machine Learning for Security Requirements Analysis: Practical Approaches. в A. Sadovykh, D. Truscan, W. Mallouli, A. R. Cavalli, C. Seceleanu, & A. Bagnato (Ред.), CyberSecurity in a DevOps Environment: From Requirements to Monitoring (стр. 35-63). [Chapter 2] (CyberSecurity in a DevOps Environment: From Requirements to Monitoring). Springer. https://doi.org/10.1007/978-3-031-42212-6_2

Vancouver

Sadovykh A, Yakovlev K, Naumchev A, Ivanov V. Natural Language Processing with Machine Learning for Security Requirements Analysis: Practical Approaches. в Sadovykh A, Truscan D, Mallouli W, Cavalli AR, Seceleanu C, Bagnato A, Редакторы, CyberSecurity in a DevOps Environment: From Requirements to Monitoring. Springer. 2023. стр. 35-63. Chapter 2. (CyberSecurity in a DevOps Environment: From Requirements to Monitoring). doi: 10.1007/978-3-031-42212-6_2

Author

Sadovykh, Andrey ; Yakovlev, Kirill ; Naumchev, Alexandr и др. / Natural Language Processing with Machine Learning for Security Requirements Analysis: Practical Approaches. CyberSecurity in a DevOps Environment: From Requirements to Monitoring. Редактор / Andrey Sadovykh ; Dragos Truscan ; Wissam Mallouli ; Ana Rosa Cavalli ; Cristina Seceleanu ; Alessandra Bagnato. Springer, 2023. стр. 35-63 (CyberSecurity in a DevOps Environment: From Requirements to Monitoring).

BibTeX

@inbook{37a39e18171744e8b54e666bc8bdb115,
title = "Natural Language Processing with Machine Learning for Security Requirements Analysis: Practical Approaches",
abstract = "Analyzing security requirements is a tedious task. Quite often they are spread around requirements specifications or specified in a very generic form. The experts have to make sure to extract all the security requirements and properly detail by applying the best practices from appropriate standards such as OWASP ASVS, STIG, or IEC62443. The requirements are specified in various forms, most commonly as statements in natural language. Natural language processing (NLP) has been applied for many years in requirements engineering (RE) for many analysis tasks. However, until recently, the performance on NLP methods on the RE tasks has been questionable. In this chapter, we outline the state of the art in the NLP methods in RE and in particular analysis of security requirements as well as provide practical recipes application of modern transfer learning architectures to several important RE tasks illustrated with an example.",
keywords = "Security requirements, Requirements engineering, Natural language processing, Machine learning, Dataset, Classification, Semantic search, VeriDevOps",
author = "Andrey Sadovykh and Kirill Yakovlev and Alexandr Naumchev and Vladimir Ivanov",
year = "2023",
month = aug,
day = "23",
doi = "10.1007/978-3-031-42212-6_2",
language = "English",
isbn = "978-3-031-42211-9",
series = "CyberSecurity in a DevOps Environment: From Requirements to Monitoring",
publisher = "Springer",
pages = "35--63",
editor = "Andrey Sadovykh and Dragos Truscan and Wissam Mallouli and Cavalli, {Ana Rosa} and Cristina Seceleanu and Alessandra Bagnato",
booktitle = "CyberSecurity in a DevOps Environment",
address = "United States",

}

RIS

TY - CHAP

T1 - Natural Language Processing with Machine Learning for Security Requirements Analysis: Practical Approaches

AU - Sadovykh, Andrey

AU - Yakovlev, Kirill

AU - Naumchev, Alexandr

AU - Ivanov, Vladimir

PY - 2023/8/23

Y1 - 2023/8/23

N2 - Analyzing security requirements is a tedious task. Quite often they are spread around requirements specifications or specified in a very generic form. The experts have to make sure to extract all the security requirements and properly detail by applying the best practices from appropriate standards such as OWASP ASVS, STIG, or IEC62443. The requirements are specified in various forms, most commonly as statements in natural language. Natural language processing (NLP) has been applied for many years in requirements engineering (RE) for many analysis tasks. However, until recently, the performance on NLP methods on the RE tasks has been questionable. In this chapter, we outline the state of the art in the NLP methods in RE and in particular analysis of security requirements as well as provide practical recipes application of modern transfer learning architectures to several important RE tasks illustrated with an example.

AB - Analyzing security requirements is a tedious task. Quite often they are spread around requirements specifications or specified in a very generic form. The experts have to make sure to extract all the security requirements and properly detail by applying the best practices from appropriate standards such as OWASP ASVS, STIG, or IEC62443. The requirements are specified in various forms, most commonly as statements in natural language. Natural language processing (NLP) has been applied for many years in requirements engineering (RE) for many analysis tasks. However, until recently, the performance on NLP methods on the RE tasks has been questionable. In this chapter, we outline the state of the art in the NLP methods in RE and in particular analysis of security requirements as well as provide practical recipes application of modern transfer learning architectures to several important RE tasks illustrated with an example.

KW - Security requirements

KW - Requirements engineering

KW - Natural language processing

KW - Machine learning

KW - Dataset

KW - Classification

KW - Semantic search

KW - VeriDevOps

UR - https://www.mendeley.com/catalogue/21fe070c-877e-3248-959c-4a80606bee0b/

U2 - 10.1007/978-3-031-42212-6_2

DO - 10.1007/978-3-031-42212-6_2

M3 - Chapter

SN - 978-3-031-42211-9

T3 - CyberSecurity in a DevOps Environment: From Requirements to Monitoring

SP - 35

EP - 63

BT - CyberSecurity in a DevOps Environment

A2 - Sadovykh, Andrey

A2 - Truscan, Dragos

A2 - Mallouli, Wissam

A2 - Cavalli, Ana Rosa

A2 - Seceleanu, Cristina

A2 - Bagnato, Alessandra

PB - Springer

ER -

ID: 65524042