%PDF-1.5
%
1 0 obj
<>
endobj
2 0 obj
<>
endobj
3 0 obj
<>stream
IEEE
IEEE Transactions on Software Engineering; ;PP;99;10.1109/TSE.2020.3030745
Security requirements
requirements dependency management
requirements traceability
vulnerability discovery
Detecting Software Security Vulnerabilities via Requirements Dependency Analysis
endstream
endobj
4 0 obj
<>stream
x+ |
endstream
endobj
5 0 obj
<>stream
xʹ0~bJPq Dk%`|=MF3ѝ'
3~ h75[>stream
x+ |
endstream
endobj
7 0 obj
<>stream
xʹ0~bJP#`$Z+q`Q
4o4=iix1_H0_$PoW%j.v9JRaͮ`LyZLag|qRQ:R0jMYר4ys[ p!z."0m[rMG2!<
endstream
endobj
8 0 obj
<>stream
x+ |
endstream
endobj
9 0 obj
<>stream
x0D)AB!F\JǑ0Xxm@4͛7iixbtM9~RHvMSK#^Ǟpe]H6c(oH331tJ
FHDq1y^bS%N]#fކ蹊,.t]7*5hG_0<
endstream
endobj
10 0 obj
<>stream
x+ |
endstream
endobj
11 0 obj
<>stream
xʹ0~bJP#.HAA0Xxm@4͠;4O?dZ,*?+BG}i9i}X99F^s3BQf
&BM4OSۢ(p66DUdqwQ@%}5<
endstream
endobj
12 0 obj
<>stream
x+ |
endstream
endobj
13 0 obj
<>stream
xʹ0~bJPq Dk%`|=MF3ѝ'VTKCc6Ϧ⑮Ψt>vxDוS$9.DNoH3k([+H&q>JhV4ES[Kpw1.m[3͍
C/<~
endstream
endobj
14 0 obj
<>stream
x+ |
endstream
endobj
15 0 obj
<>stream
xO@s$"ӃVi>stream
x+ |
endstream
endobj
17 0 obj
<>stream
xʽ0#H4?uҁkTR8J)gӃ֚gc]Q_
ex{AͥuGl_d89~Z8!rv%;g"'b.QvƗ7(5l)N:G(
ZM
sY\i`Th:Ҟ4^<
endstream
endobj
18 0 obj
<>stream
x+ |
endstream
endobj
19 0 obj
<>stream
xO@s$
*ӃVii^b[]#&蹌,.t]N07*4iO_5<
endstream
endobj
20 0 obj
<>stream
x+ |
endstream
endobj
21 0 obj
<>stream
xʹ0~bJPp(G
HVp`Q
4o4ii|3R/P͓ojixīx3=;JRcŮbLkyF̹?
FY)I8j/-6eY5mmL5C}RӁv2<
endstream
endobj
22 0 obj
<>stream
x+ |
endstream
endobj
23 0 obj
<>stream
xʹ0~bJPg:hāE7_O@ӼtAW!lLSC#^ǖ.txەc(NoH53lj1ewJ
FHDq6di^`9m-&蹈,.mN75iO_6<
endstream
endobj
24 0 obj
<>stream
x+ |
endstream
endobj
25 0 obj
<>stream
xʹ0~bJP#.HAAJXxm@4`OwZi9?dZ,*?Båu#ؾ{Gqr>p|Cjٕ윉`#/8/PjP|:'FŶ(
FM
sY\`oTh:Ҟ1b<
endstream
endobj
26 0 obj
<>/SaveStreams<>/Metadata 3 0 R/Type/Catalog/Outlines 30 0 R/Pages 31 0 R>>
endobj
30 0 obj
<>
endobj
28 0 obj
<>stream
xS(T e
endstream
endobj
29 0 obj
<>stream
xST %
endstream
endobj
31 0 obj
<>
endobj
32 0 obj
<>
endobj
33 0 obj
<>
endobj
27 0 obj
<>>>/Parent 32 0 R/MediaBox[0 0 612 792]>>
endobj
34 0 obj
<>/Font<>>>/Parent 32 0 R/MediaBox[0 0 612 792]>>
endobj
35 0 obj
<>>>/Parent 32 0 R/MediaBox[0 0 612 792]>>
endobj
36 0 obj
<>/Font<>>>/Parent 32 0 R/MediaBox[0 0 612 792]>>
endobj
37 0 obj
<>>>/Parent 32 0 R/MediaBox[0 0 612 792]>>
endobj
38 0 obj
<>>>/Parent 32 0 R/MediaBox[0 0 612 792]>>
endobj
39 0 obj
<>>>/Parent 33 0 R/MediaBox[0 0 612 792]>>
endobj
40 0 obj
<>>>/Parent 33 0 R/MediaBox[0 0 612 792]>>
endobj
41 0 obj
<>/Font<>>>/Parent 33 0 R/MediaBox[0 0 612 792]>>
endobj
42 0 obj
<>/Font<>>>/Parent 33 0 R/MediaBox[0 0 612 792]>>
endobj
43 0 obj
<>>>/Parent 33 0 R/MediaBox[0 0 612 792]>>
endobj
44 0 obj
<>stream
HWmo8n_bFԻ[mפbHͮ,yE*U-M3<[;^B#@9Z,'a$E$AjrE>K@gA|G։5C\-6\JV^mǚTxxձq8
8Z+`tZKbam^!iSѮwEWk).xSx-75Zڴ)o`rx6k0N (K3EIQhkpv5FzdA,lwE^*TPDt