Follow
Tong Li (李童)
Title
Cited by
Cited by
Year
Goal-oriented requirements engineering: an extended systematic mapping study
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, L Piras, ...
Requirements Engineering 24 (2), 133-160, 2019
2292019
A systematic literature review of methods and datasets for anomaly-based network intrusion detection
Z Yang, X Liu, T Li, D Wu, J Wang, Y Zhao, H Han
Computers & Security 116, 102675, 2022
2132022
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)
A Yasin, L Liu, T Li, J Wang, D Zowghi
Information and Software Technology 95, 179-200, 2018
1022018
Improving software security awareness using a serious game
A Yasin, L Liu, T Li, R Fatima, W Jianmin
IET Software 13 (2), 159-169, 2019
922019
Designing IT systems according to environmental settings: a strategic analysis framework
H Zhang, L Liu, T Li
The Journal of Strategic Information Systems 20 (1), 80-95, 2011
862011
Goal-oriented requirements engineering: a systematic literature map
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 106-115, 2016
832016
Why Requirements Engineering Fails: A Survey Report from China
L Liu, T Li, F Peng
Requirements Engineering Conference (RE), 2010 18th IEEE International, 317-322, 2010
672010
A GAN and Feature Selection‐Based Oversampling Technique for Intrusion Detection
X Liu, T Li, R Zhang, D Wu, Y Liu, Z Yang
Security and Communication Networks 2021 (1), 9947059, 2021
642021
An effective sarcasm detection approach based on sentimental context and individual expression habits
Y Du, T Li, MS Pathan, HK Teklehaimanot, Z Yang
Cognitive Computation 14 (1), 78-90, 2022
612022
Taking Goal Models Downstream: A Systematic Roadmap
J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos, ...
RCIS 2014, 2014
512014
Security Attack Analysis Using Attack Patterns
T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers
482016
Using Goal Models Downstream: A Systematic Roadmap and Literature Review
J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos
International Journal of Information System Modeling and Design (IJISMD) 6 …, 2015
442015
An Outlier Detection Approach Based on Improved Self-Organizing Feature Map Clustering Algorithm
P Yang, D Wang, Z Wei, X Du, T Li
IEEE Access 7, 115914-115925, 2019
432019
Dealing with security requirements for socio-technical systems: A holistic approach
T Li, J Horkoff
Advanced Information Systems Engineering: 26th International Conference …, 2014
412014
How stakeholders’ data literacy contributes to student success in higher education: a goal-oriented analysis
N Yang, T Li
International Journal of Educational Technology in Higher Education 17 (1), 41, 2020
402020
Security requirements engineering in the wild: A survey of common practices
G Elahi, E Yu, T Li, L Liu
Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th …, 2011
392011
An ontology-based learning approach for automatically classifying security requirements
T Li, Z Chen
Journal of Systems and Software 165, 110566, 2020
372020
Integrating security patterns with security requirements analysis using contextual goal models
T Li, J Horkoff, J Mylopoulos
The Practice of Enterprise Modeling: 7th IFIP WG 8.1 Working Conference …, 2014
302014
Aligning social concerns with information system security: A fundamental ontology for social engineering
T Li, X Wang, Y Ni
Information Systems 104, 101699, 2022
292022
Holistic security requirements analysis for socio-technical systems
T Li, J Horkoff, J Mylopoulos
Software & Systems Modeling 17, 1253-1285, 2018
282018
The system can't perform the operation now. Try again later.
Articles 1–20