Tong Li (李童)
Cited by
Cited by
Goal-oriented requirements engineering: an extended systematic mapping study
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, L Piras, ...
Requirements Engineering 24 (2), 133-160, 2019
A systematic literature review of methods and datasets for anomaly-based network intrusion detection
Z Yang, X Liu, T Li, D Wu, J Wang, Y Zhao, H Han
Computers & Security 116, 102675, 2022
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)
A Yasin, L Liu, T Li, J Wang, D Zowghi
Information and Software Technology 95, 179-200, 2018
Designing IT systems according to environmental settings: a strategic analysis framework
H Zhang, L Liu, T Li
The Journal of Strategic Information Systems 20 (1), 80-95, 2011
Goal-oriented requirements engineering: a systematic literature map
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 106-115, 2016
Improving software security awareness using a serious game
A Yasin, L Liu, T Li, R Fatima, W Jianmin
IET Software 13 (2), 159-169, 2019
Why Requirements Engineering Fails: A Survey Report from China
L Liu, T Li, F Peng
Requirements Engineering Conference (RE), 2010 18th IEEE International, 317-322, 2010
Taking Goal Models Downstream: A Systematic Roadmap
J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos, ...
RCIS 2014, 2014
An effective sarcasm detection approach based on sentimental context and individual expression habits
Y Du, T Li, MS Pathan, HK Teklehaimanot, Z Yang
Cognitive Computation 14 (1), 78-90, 2022
A GAN and feature selection-based oversampling technique for intrusion detection
X Liu, T Li, R Zhang, D Wu, Y Liu, Z Yang
Security and communication networks 2021, 1-15, 2021
Using Goal Models Downstream: A Systematic Roadmap and Literature Review
J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos
International Journal of Information System Modeling and Design (IJISMD) 6 …, 2015
Security Attack Analysis Using Attack Patterns
T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers
Dealing with security requirements for socio-technical systems: A holistic approach
T Li, J Horkoff
Advanced Information Systems Engineering: 26th International Conference …, 2014
An Outlier Detection Approach Based on Improved Self-Organizing Feature Map Clustering Algorithm
P Yang, D Wang, Z Wei, X Du, T Li
IEEE Access 7, 115914-115925, 2019
Security requirements engineering in the wild: A survey of common practices
G Elahi, E Yu, T Li, L Liu
Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th …, 2011
How stakeholders’ data literacy contributes to student success in higher education: a goal-oriented analysis
N Yang, T Li
International Journal of Educational Technology in Higher Education 17 (1), 41, 2020
An ontology-based learning approach for automatically classifying security requirements
T Li, Z Chen
Journal of Systems and Software 165, 110566, 2020
Integrating security patterns with security requirements analysis using contextual goal models
T Li, J Horkoff, J Mylopoulos
The Practice of Enterprise Modeling: 7th IFIP WG 8.1 Working Conference …, 2014
Holistic security requirements analysis for socio-technical systems
T Li, J Horkoff, J Mylopoulos
Software & Systems Modeling 17, 1253-1285, 2018
Sentiment Classification Based on Information Geometry and Deep Belief Networks
M Wang, ZH Ning, C Xiao, T Li
IEEE Access 6, 35206-35213, 2018
The system can't perform the operation now. Try again later.
Articles 1–20