Tong Li (李童)
Title
Cited by
Cited by
Year
Designing IT systems according to environmental settings: a strategic analysis framework
H Zhang, L Liu, T Li
The Journal of Strategic Information Systems 20 (1), 80-95, 2011
592011
Goal-oriented requirements engineering: an extended systematic mapping study
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, L Piras, ...
Requirements Engineering 24 (2), 133-160, 2019
532019
Goal-oriented requirements engineering: a systematic literature map
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 106-115, 2016
502016
Why Requirements Engineering Fails: A Survey Report from China
L Liu, T Li, F Peng
Requirements Engineering Conference (RE), 2010 18th IEEE International, 317-322, 2010
442010
Taking Goal Models Downstream: A Systematic Roadmap
J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos, ...
RCIS 2014, 2014
352014
Dealing with security requirements for socio-technical systems: A holistic approach
T Li, J Horkoff
International Conference on Advanced Information Systems Engineering, 285-300, 2014
282014
Security requirements engineering in the wild: A survey of common practices
G Elahi, E Yu, T Li, L Liu
Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th …, 2011
272011
Using Goal Models Downstream: A Systematic Roadmap and Literature Review
J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos
International Journal of Information System Modeling and Design (IJISMD) 6 …, 2015
232015
Security Attack Analysis Using Attack Patterns
T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers
212016
Integrating security patterns with security requirements analysis using contextual goal models
T Li, J Horkoff, J Mylopoulos
IFIP Working Conference on The Practice of Enterprise Modeling, 208-223, 2014
202014
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)
A Yasin, L Liu, T Li, J Wang, D Zowghi
Information and Software Technology 95, 179-200, 2018
182018
Computer aided threat identification
Y Asnar, T Li, F Massacci, F Paci
2011 IEEE 13th Conference on Commerce and Enterprise Computing, 145-152, 2011
182011
Evaluating Modeling Languages: An Example from the Requirements Domain
J Horkoff, FB Aydemir, FL Li, T Li, J Mylopoulos
Conceptual Modeling (ER'14), 2014
142014
Goal-oriented requirements modelling for running systems
YS Jian, T Li, L Liu, E Yu
2010 First International Workshop on Requirements@ Run. Time, 1-8, 2010
142010
Service security analysis based on i*: An approach from the attacker viewpoint
T Li, L Liu, G Elahi, E Yu, BR Bryant
2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010
132010
Improving software security awareness using a serious game
A Yasin, L Liu, T Li, R Fatima, W Jianmin
IET Software 13 (2), 159-169, 2018
112018
Holistic security requirements analysis for socio-technical systems
T Li, J Horkoff, J Mylopoulos
Software & Systems Modeling 17 (4), 1253-1285, 2018
102018
Sentiment Classification Based on Information Geometry and Deep Belief Networks
M Wang, ZH Ning, C Xiao, T Li
IEEE Access 6, 35206-35213, 2018
82018
A Holistic Approach to Security Attack Modeling and Analysis
T Li, J Horkoff, K Beckers, E Paja, J Mylopoulos
82015
A Prototype Tool for Modeling and Analyzing Security Requirements from A Holistic Viewpoint.
T Li, J Horkoff, J Mylopoulos
CAiSE (Forum/Doctoral Consortium), 185-192, 2014
82014
The system can't perform the operation now. Try again later.
Articles 1–20