Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › глава/раздел › научная › Рецензирование
Natural Language Processing with Machine Learning for Security Requirements Analysis: Practical Approaches. / Sadovykh, Andrey; Yakovlev, Kirill; Naumchev, Alexandr и др.
CyberSecurity in a DevOps Environment: From Requirements to Monitoring. ред. / Andrey Sadovykh; Dragos Truscan; Wissam Mallouli; Ana Rosa Cavalli; Cristina Seceleanu; Alessandra Bagnato. Springer, 2023. стр. 35-63 Chapter 2 (CyberSecurity in a DevOps Environment: From Requirements to Monitoring).Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › глава/раздел › научная › Рецензирование
}
TY - CHAP
T1 - Natural Language Processing with Machine Learning for Security Requirements Analysis: Practical Approaches
AU - Sadovykh, Andrey
AU - Yakovlev, Kirill
AU - Naumchev, Alexandr
AU - Ivanov, Vladimir
PY - 2023/8/23
Y1 - 2023/8/23
N2 - Analyzing security requirements is a tedious task. Quite often they are spread around requirements specifications or specified in a very generic form. The experts have to make sure to extract all the security requirements and properly detail by applying the best practices from appropriate standards such as OWASP ASVS, STIG, or IEC62443. The requirements are specified in various forms, most commonly as statements in natural language. Natural language processing (NLP) has been applied for many years in requirements engineering (RE) for many analysis tasks. However, until recently, the performance on NLP methods on the RE tasks has been questionable. In this chapter, we outline the state of the art in the NLP methods in RE and in particular analysis of security requirements as well as provide practical recipes application of modern transfer learning architectures to several important RE tasks illustrated with an example.
AB - Analyzing security requirements is a tedious task. Quite often they are spread around requirements specifications or specified in a very generic form. The experts have to make sure to extract all the security requirements and properly detail by applying the best practices from appropriate standards such as OWASP ASVS, STIG, or IEC62443. The requirements are specified in various forms, most commonly as statements in natural language. Natural language processing (NLP) has been applied for many years in requirements engineering (RE) for many analysis tasks. However, until recently, the performance on NLP methods on the RE tasks has been questionable. In this chapter, we outline the state of the art in the NLP methods in RE and in particular analysis of security requirements as well as provide practical recipes application of modern transfer learning architectures to several important RE tasks illustrated with an example.
KW - Security requirements
KW - Requirements engineering
KW - Natural language processing
KW - Machine learning
KW - Dataset
KW - Classification
KW - Semantic search
KW - VeriDevOps
UR - https://www.mendeley.com/catalogue/21fe070c-877e-3248-959c-4a80606bee0b/
U2 - 10.1007/978-3-031-42212-6_2
DO - 10.1007/978-3-031-42212-6_2
M3 - Chapter
SN - 978-3-031-42211-9
T3 - CyberSecurity in a DevOps Environment: From Requirements to Monitoring
SP - 35
EP - 63
BT - CyberSecurity in a DevOps Environment
A2 - Sadovykh, Andrey
A2 - Truscan, Dragos
A2 - Mallouli, Wissam
A2 - Cavalli, Ana Rosa
A2 - Seceleanu, Cristina
A2 - Bagnato, Alessandra
PB - Springer
ER -
ID: 65524042