default search action
Tong Li 0001
Person information
- affiliation: Beijing University of Technology, China
- affiliation (PhD 2016): University of Trento, Italy
- affiliation (former): Tsinghua University, School of Software, Beijing, China
Other persons with the same name
- Tong Li — disambiguation page
- Tong Li 0002 — PLA Engineering Academy of Armored Forces, Beijing
- Tong Li 0003 — Lenovo (and 2 more)
- Tong Li 0004 — Yunnan University, School of Software, Kunming, China
- Tong Li 0005 — University of Iowa, Department of Mathematics, Iowa City, IA, USA
- Tong Li 0006 — Beijing Institute of Technology, Civil Aviation Management Institute of China, Beijing, China
- Tong Li 0007 — Shenzhen University, China
- Tong Li 0008 — Queensland University of Technology, Brisbane, QLD, Australia (and 1 more)
- Tong Li 0009 — Zhejiang University, Department of Mechanical Engineering, Hangzhou, China
- Tong Li 0010 — Harbin Institute of Technology, Department of Information Engineering, China
- Tong Li 0011 — Guangzhou University, School of Computer Science, China (and 1 more)
- Tong Li 0012 — University of Chinese Academy of Sciences, School of Engineering Science, Beijing, China
- Tong Li 0013 — University of Helsinki, Finland (and 2 more)
- Tong Li 0014 — Renmin University of China, Beijing, China (and 2 more)
- Tong Li 0015 — De Montfort University, Leicester, UK
- Tong Li 0016 — Beijing Institute of Technology, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j37]Hao Yue, Tong Li, Di Wu, Runzi Zhang, Zhen Yang:
Detecting APT attacks using an attack intent-driven and sequence-based learning approach. Comput. Secur. 140: 103748 (2024) - [j36]Di Wu, Zhen Yang, Tong Li, Junrui Liu:
JOCP: A jointly optimized clustering protocol for industrial wireless sensor networks using double-layer selection evolutionary algorithm. Concurr. Comput. Pract. Exp. 36(4) (2024) - [j35]Junrui Liu, Tong Li, Zhen Yang, Di Wu, Huan Liu:
Fusion learning of preference and bias from ratings and reviews for item recommendation. Data Knowl. Eng. 150: 102283 (2024) - [j34]Zifang Tang, Tong Li, Di Wu, Junrui Liu, Zhen Yang:
A Systematic Literature Review of Reinforcement Learning-based Knowledge Graph Research. Expert Syst. Appl. 238(Part B): 121880 (2024) - [j33]Di Wu, Tong Li, Yiran Zhao, Junrui Liu, Zifang Tang, Zhen Yang:
A Novel Entity and Relation Joint Interaction Learning Approach for Entity Alignment. Int. J. Softw. Eng. Knowl. Eng. 34(5): 821-843 (2024) - [j32]Tong Li, Xinran Zhang, Yunduo Wang, Qixiang Zhou, Yiting Wang, Fangqi Dong:
Machine learning for requirements engineering (ML4RE): A systematic literature review complemented by practitioners' voices from Stack Overflow. Inf. Softw. Technol. 172: 107477 (2024) - [j31]Tong Li, Yiting Wang, Xiang Wei, Xueying Zhang, Yu Liu:
MUREQ: a multilayer framework for analyzing and operationalizing visualization requirements. Softw. Syst. Model. 23(5): 1123-1155 (2024) - [c70]Yiran Zhao, Di Wu, Shuqi Dai, Tong Li:
Integrating Dependency Type and Directionality into Adapted Graph Attention Networks to Enhance Relation Extraction. ICDAR (4) 2024: 287-305 - [c69]Mohamad Gharib, Katrien De Moor, Tong Li:
1st International Usable Security and Privacy for Emerging Technologies Workshop (ASPIRING 2024): Preface. RCIS Workshops 2024 - [e3]João Araújo, Jose Luis de la Vara, Nelly Condori-Fernández, Jean-Michel Bruel, Maribel Yasmina Santos, Saïd Assar, Katrien De Moor, Mohamad Gharib, Tong Li, João Paulo Barros, Isabel Sofia Brito, Ivan Machado, Dimitris Karagiannis, Tiago Prince Sales, Camille Salinesi:
Joint Proceedings of RCIS 2024 Workshops and Research Projects Track co-located with the 18th International Conferecence on Research Challenges in Information Science (RCIS 2024), Guimarães, Portugal, May 14-17, 2024. CEUR Workshop Proceedings 3674, CEUR-WS.org 2024 [contents] - 2023
- [j30]Di Wu, Weite Feng, Tong Li, Zhen Yang:
Evaluating the intelligence capability of smart homes: A conceptual modeling approach. Data Knowl. Eng. 148: 102218 (2023) - [j29]Rui Song, Tong Li, Xin Dong, Zhiming Ding:
An effective points of interest recommendation approach based on embedded meta-path of spatiotemporal data. Expert Syst. J. Knowl. Eng. 40(2) (2023) - [j28]Tong Li, Chuanyong Song, Qinyu Pang:
Defending against social engineering attacks: A security pattern-based analysis framework. IET Inf. Secur. 17(4): 703-726 (2023) - [j27]Meira Levy, Irit Hadar, Jennifer Horkoff, Jane Huffman Hayes, Barbara Paech, Alex Dekhtyar, Gunter Mussbacher, Elda Paja, Tong Li, Seok-Won Lee, Dongfeng Fang:
Philanthropic conference-based requirements engineering in time of pandemic and beyond. Requir. Eng. 28(2): 213-227 (2023) - [j26]Xiaohong Chen, Juan Zhang, Zhi Jin, Min Zhang, Tong Li, Xiang Chen, Tingliang Zhou:
Empowering Domain Experts With Formal Methods for Consistency Verification of Safety Requirements. IEEE Trans. Intell. Transp. Syst. 24(12): 15146-15157 (2023) - [c68]Tong Li, Xiang Wei, Yiting Wang:
A Requirements-Driven Framework for Automatic Data Visualization. BPMDS/EMMSAD@CAiSE 2023: 297-311 - [c67]Zhen Yang, Junrui Liu, Tong Li, Di Wu, Shiqiu Yang, Huan Liu:
A Two-tier Shared Embedding Method for Review-based Recommender Systems. CIKM 2023: 2928-2938 - [c66]Jinyi Wang, Tong Li, Hongyu Gao:
Application Recommendation based on Metagraphs: Combining Behavioral and Published Information. COMPSAC 2023: 250-259 - [c65]Tong Li, Lu Han:
Dealing with Explainability Requirements for Machine Learning Systems. COMPSAC 2023: 1203-1208 - [c64]Yu Liu, Tong Li, Zheqing Huang, Zhen Yang:
BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation. SEET@ICSE 2023: 141-152 - [c63]Lu Han, Qixiang Zhou, Tong Li:
Improving Requirements Classification Models Based on Explainable Requirements Concerns. REW 2023: 95-101 - [c62]Tong Li, Xinran Zhang, Yiting Wang:
Discovering Runtime Requirements from User Interactions: Ideas and Preliminary Studies. RE 2023: 323-328 - [c61]Lidan Zhao, Tong Li, Zhen Yang, Junrui Liu:
A novel subjective bias detection method based on multi-information fusion. SEKE 2023: 449-455 - [c60]Jiacheng Li, Tong Li, Runzi Zhang, Di Wu, Hao Yue, Zhen Yang:
APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning. TrustCom 2023: 10-19 - 2022
- [j25]Yongheng Liu, Zhen Yang, Tong Li, Di Wu:
A novel POI recommendation model based on joint spatiotemporal effects and four-way interaction. Appl. Intell. 52(5): 5310-5324 (2022) - [j24]Yuran Zhu, Tong Li:
An object detection-based framework for automatically recognizing iStar hand drafts. Autom. Softw. Eng. 29(2): 57 (2022) - [j23]Yu Du, Tong Li, Muhammad Salman Pathan, Hailay Kidu Teklehaymanot, Zhen Yang:
An Effective Sarcasm Detection Approach Based on Sentimental Context and Individual Expression Habits. Cogn. Comput. 14(1): 78-90 (2022) - [j22]Zhen Yang, Xiaodong Liu, Tong Li, Di Wu, Jinjiang Wang, Yunwei Zhao, Han Han:
A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput. Secur. 116: 102675 (2022) - [j21]Zhi Cai, Jiawei Wang, Tong Li, Bowen Yang, Xing Su, Limin Guo, Zhiming Ding:
A Novel Trajectory Based Prediction Method for Urban Subway Design. ISPRS Int. J. Geo Inf. 11(2): 126 (2022) - [j20]Weite Feng, Junrui Liu, Tong Li, Zhen Yang, Di Wu:
FAC: A Music Recommendation Model Based on Fusing Audio and Chord Features (115). Int. J. Softw. Eng. Knowl. Eng. 32(11&12): 1753-1770 (2022) - [j19]Tong Li, Xiaowei Wang, Yeming Ni:
Aligning social concerns with information system security: A fundamental ontology for social engineering. Inf. Syst. 104: 101699 (2022) - [j18]Junrui Liu, Zhen Yang, Tong Li, Di Wu, Ruiyi Wang:
SPR: Similarity pairwise ranking for personalized recommendation. Knowl. Based Syst. 239: 107828 (2022) - [c59]Tong Li, Yiting Wang, Congkai Geng:
Detection of anomalous modeling behavior: a goal-driven data mining approach. MoDELS (Companion) 2022: 142-145 - [c58]Qixiang Zhou, Tong Li, Yunduo Wang:
Assisting in requirements goal modeling: a hybrid approach based on machine learning and logical reasoning. MoDELS 2022: 199-209 - [c57]Tong Li, Tianai Zhang:
Continuous Usability Requirements Evaluation based on Runtime User Behavior Mining. QRS 2022: 1036-1045 - [c56]Qixiang Zhou, Tong Li:
A User-friendly Semi-automatic iStar Modeling Approach. RE 2022: 259 - [c55]Haonan Xiong, Yunduo Wang, Tong Li:
BiStar: A Template-Based iStar Modeling Tool Combining Graphical and Textual Modeling. RE 2022: 260-261 - [c54]Rongchen Li, Tong Li:
Telling Us Your Needs with Your Eyes. RE 2022: 323-329 - [c53]Zhanshi Li, Tong Li, Runzi Zhang, Di Wu, Zhen Yang:
A Novel Network Alert Classification Model based on Behavior Semantic. SEKE 2022: 553-558 - [c52]Weite Feng, Tong Li, Zhen Yang:
COAT: A Music Recommendation Model based on Chord Progression and Attention Mechanisms. SEKE 2022: 616-621 - [e2]Alejandro Maté, Tong Li, Enyo J. T. Gonçalves:
Proceedings of the 15th International iStar Workshop (iStar 2022) co-located with 41th International Conference on Conceptual Modeling (ER 2022), Virtual Event, Hyderabad, India, October 17, 2022. CEUR Workshop Proceedings 3231, CEUR-WS.org 2022 [contents] - 2021
- [j17]Yunduo Wang, Tong Li, Qixiang Zhou, Jinlian Du:
Toward practical adoption of i* framework: an automatic two-level layout approach. Requir. Eng. 26(3): 301-323 (2021) - [j16]Xiaodong Liu, Tong Li, Runzi Zhang, Di Wu, Yongheng Liu, Zhen Yang:
A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection. Secur. Commun. Networks 2021: 9947059:1-9947059:15 (2021) - [j15]Xin Dong, Tong Li, Rui Song, Zhiming Ding:
Profiling users via their reviews: an extended systematic mapping study. Softw. Syst. Model. 20(1): 49-69 (2021) - [j14]Zhi Cai, Gongyu Sun, Xing Su, Tong Li, Limin Guo, Zhiming Ding:
Visual Analysis of Land Use Characteristics Around Urban Rail Transit Stations. IEEE Trans. Intell. Transp. Syst. 22(10): 6221-6231 (2021) - [c51]Guodi Wang, Tong Li, Hao Yue, Zhen Yang, Runzi Zhang:
Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis. COMPSAC 2021: 714-724 - [c50]Wenxing Liu, Yunduo Wang, Qixiang Zhou, Tong Li:
Graphical Modeling VS. Textual Modeling: An Experimental Comparison Based on iStar Models. COMPSAC 2021: 844-853 - [c49]Hailay Kidu, Haile Misgna, Tong Li, Zhen Yang:
User Response-Based Fake News Detection on Social Media. ICAI 2021: 173-187 - [c48]Yilong Yang, Younggi Bok, Zhuoxi Yang, Eric Sheriff, Tong Li:
Goal2UCM: Automatic Generation of Use Case Model from iStar Model. iStar 2021: 21-27 - [c47]Yunduo Wang, Jinlian Du, Tong Li:
A Learner-Friendly Approach for Using the iStar Modeling Framework: an Ongoing Study. iStar 2021: 42-48 - [c46]Weite Feng, Tong Li, Haiyang Yu, Zhen Yang:
A Hybrid Music Recommendation Algorithm Based on Attention Mechanism. MMM (1) 2021: 328-339 - [c45]Yinghao Zhi, Tong Li, Zhen Yang:
Extracting features from app descriptions based on POS and dependency. SAC 2021: 1354-1358 - [e1]Marcela Ruiz, Tong Li, Vik Pant:
Proceedings of the 14th International iStar Workshop (iStar 2021), co-located with 40th International Conference on Conceptual Modeling (ER 2021), St. Johns (NL), Canada, October 18, 2021. CEUR Workshop Proceedings 2983, CEUR-WS.org 2021 [contents] - 2020
- [j13]Jinli Zhang, Zongli Jiang, Yongping Du, Tong Li, Yida Wang, Xiaohua Hu:
Hierarchy construction and classification of heterogeneous information networks based on RSDAEf. Data Knowl. Eng. 127: 101790 (2020) - [j12]Rui Song, Tong Li, Xin Dong, Zhiming Ding:
Identifying Similar Users Based on Their Check-in Data: A Graph Embedding Approach. Int. J. Softw. Eng. Knowl. Eng. 30(11&12): 1735-1757 (2020) - [j11]Tong Li, Zhishuai Chen:
An ontology-based learning approach for automatically classifying security requirements. J. Syst. Softw. 165: 110566 (2020) - [j10]Zhi Cai, Tong Li, Xing Su, Limin Guo, Zhiming Ding:
Research on Analysis Method of Characteristics Generation of Urban Rail Transit. IEEE Trans. Intell. Transp. Syst. 21(9): 3608-3620 (2020) - [c44]Guoshuai Zhao, Tong Li, Zhen Yang:
An Extended Knowledge Representation Learning Approach for Context-Based Traceability Link Recovery: Extended Abstract. AIRE@RE 2020: 22 - [c43]Rui Song, Tong Li, Zhiming Ding:
Automatically Identifying Requirements-Oriented Reviews Using a Top-Down Feature Extraction Approach. APSEC 2020: 450-454 - [c42]Ruiyi Wang, Tong Li, Zhen Yang, Haiyang Yu:
Predicting Polypharmacy Side Effects Based on an Enhanced Domain Knowledge Graph. ICAI 2020: 89-103 - [c41]Jennifer Horkoff, Tong Li:
Using the Doughnut Model to Support Sustainable Quality Requirements in iStar. iStar 2020: 1-6 - [c40]Yuran Zhu, Tong Li:
A Preliminary Framework for Recognizing iStar Hand Drafts. iStar 2020: 7-12 - [c39]Guoshuai Zhao, Tong Li, Zhen Yang:
An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery. SEKE 2020: 77-82 - [c38]Rui Song, Tong Li, Xin Dong, Zhiming Ding:
Identifying Similar Users Based on Metagraph of Check-in Trajectory Data. SEKE 2020: 525-531
2010 – 2019
- 2019
- [j9]Ping Yang, Dan Wang, Zhuojun Wei, Xiaolin Du, Tong Li:
An Outlier Detection Approach Based on Improved Self-Organizing Feature Map Clustering Algorithm. IEEE Access 7: 115914-115925 (2019) - [j8]Affan Yasin, Lin Liu, Tong Li, Rubia Fatima, Jianmin Wang:
Improving software security awareness using a serious game. IET Softw. 13(2): 159-169 (2019) - [j7]Jennifer Horkoff, Fatma Basak Aydemir, Evellin Cardoso, Tong Li, Alejandro Maté, Elda Paja, Mattia Salnitri, Luca Piras, John Mylopoulos, Paolo Giorgini:
Goal-oriented requirements engineering: an extended systematic mapping study. Requir. Eng. 24(2): 133-160 (2019) - [j6]Yu Wang, Tong Li, Congkai Geng, Yihan Wang:
Recognizing patterns of student's modeling behaviour patterns via process mining. Smart Learn. Environ. 6(1): 26 (2019) - [c37]Shiheng Wang, Tong Li, Zhen Yang:
Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach. APSEC 2019: 39-46 - [c36]Xin Dong, Tong Li, Xiangyang Li, Rui Song, Zhiming Ding:
Review-Based User Profiling: A Systematic Mapping Study. BPMDS/EMMSAD@CAiSE 2019: 229-244 - [c35]Tong Li, Yeming Ni:
Paving Ontological Foundation for Social Engineering Analysis. CAiSE 2019: 246-260 - [c34]Xin Dong, Tong Li, Zhiming Ding:
An Ontology Enhanced User Profiling Algorithm Based on Application Feedback. COMPSAC (1) 2019: 316-325 - [c33]Yu Wang, Tong Li, Congkai Geng, Yihan Wang:
Evaluating Student Learning Effect Based on Process Mining. ICAI 2019: 59-72 - [c32]Shiheng Wang, Tong Li, Zhen Yang:
Using Graph Embedding to Improve Requirements Traceability Recovery. ICAI 2019: 533-545 - [c31]Xiaohong Chen, Zhiwei Zhong, Zhi Jin, Min Zhang, Tong Li, Xiang Chen, Tingliang Zhou:
Automating Consistency Verification of Safety Requirements for Railway Interlocking Systems. RE 2019: 308-318 - [c30]Tong Li, Kaiyuan Wang, Jennifer Horkoff:
Towards Effective Assessment for Social Engineering Attacks. RE 2019: 392-397 - 2018
- [j5]Affan Yasin, Lin Liu, Tong Li, Jianmin Wang, Didar Zowghi:
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG). Inf. Softw. Technol. 95: 179-200 (2018) - [j4]Yang Cao, Zhi Cai, Fei Xue, Tong Li, Zhiming Ding:
Semantic Trajectory Based Behavior Generation for Groups Identification. KSII Trans. Internet Inf. Syst. 12(12): 5782-5799 (2018) - [j3]Tong Li, Jennifer Horkoff, John Mylopoulos:
Holistic security requirements analysis for socio-technical systems. Softw. Syst. Model. 17(4): 1253-1285 (2018) - [c29]Yunduo Wang, Tong Li, Haoyuan Zhang, Jiayi Sun, Yeming Ni, Congkai Geng:
A Prototype for Generating Meaningful Layout of iStar Models. ER Workshops 2018: 49-53 - [c28]Haoyuan Zhang, Tong Li, Yunduo Wang:
Design of an Empirical Study for Evaluating an Automatic Layout Tool. ER Workshops 2018: 206-211 - [c27]Jinli Zhang, Zongli Jiang, Tong Li:
CHIN: Classification with META-PATH in Heterogeneous Information Networks. ICAI 2018: 63-74 - [c26]Tong Li, Fan Zhang, Dan Wang:
Automatic User Preferences Elicitation: A Data-Driven Approach. REFSQ 2018: 324-331 - [c25]Roxana Lisette Quintanilla Portugal, Tong Li, Lyrene Fernandes da Silva, Eduardo Almentero, Julio César Sampaio do Prado Leite:
NFRfinder: a knowledge based strategy for mining non-functional requirements. SBES 2018: 102-111 - 2017
- [c24]Roxana Lisette Quintanilla Portugal, Marco Antonio Casanova, Tong Li, Julio César Sampaio do Prado Leite:
GH4RE: Repository Recommendation on GitHub for Requirements Elicitation Reuse. CAiSE-Forum-DC 2017: 113-120 - [c23]Xiaolin Du, Tong Li, Dan Wang:
An Automatic Layout Approach for iStar Models. iStar 2017: 61-66 - [c22]Elias A. Seid, Kazi Robin, Tong Li, John Mylopoulos:
Evaluation of MUSER, a holistic security requirements analysis framework. RCIS 2017: 293-304 - 2016
- [b1]Tong Li:
Holistic Security Requirements Engineering for Socio-Technical Systems. University of Trento, Italy, 2016 - [c21]Tong Li, Alicia M. Grubb, Jennifer Horkoff:
Understanding Challenges and Tradeoffs in iStar Tool Development. iStar 2016: 49-54 - [c20]Tong Li, Elda Paja, John Mylopoulos, Jennifer Horkoff, Kristian Beckers:
Security attack analysis using attack patterns. RCIS 2016: 1-13 - [c19]Jennifer Horkoff, Fatma Basak Aydemir, Evellin Cardoso, Tong Li, Alejandro Maté, Elda Paja, Mattia Salnitri, John Mylopoulos, Paolo Giorgini:
Goal-Oriented Requirements Engineering: A Systematic Literature Map. RE 2016: 106-115 - 2015
- [j2]Jennifer Horkoff, Tong Li, Feng-Lin Li, Mattia Salnitri, Evellin Cardoso, Paolo Giorgini, John Mylopoulos:
Using Goal Models Downstream: A Systematic Roadmap and Literature Review. Int. J. Inf. Syst. Model. Des. 6(2): 1-42 (2015) - [c18]Tong Li, Jennifer Horkoff, Elda Paja, Kristian Beckers, John Mylopoulos:
Analyzing Attack Strategies Through Anti-goal Refinement. PoEM 2015: 75-90 - [c17]Tong Li, Jennifer Horkoff, Kristian Beckers, Elda Paja, John Mylopoulos:
A Holistic Approach to Attack Modeling and Analysis. iStar 2015: 49-54 - [c16]Tong Li, Elda Paja, John Mylopoulos, Jennifer Horkoff, Kristian Beckers:
Holistic security requirements analysis: An attacker's perspective. RE 2015: 282-283 - [c15]Tong Li, Jennifer Horkoff, John Mylopoulos:
Analyzing and Enforcing Security Mechanisms on Requirements Specifications. REFSQ 2015: 115-131 - 2014
- [c14]Tong Li, Jennifer Horkoff, John Mylopoulos:
A Prototype Tool for Modeling and Analyzing Security Requirements from A Holistic Viewpoint. CAiSE (Forum/Doctoral Consortium) 2014: 185-192 - [c13]Tong Li, Jennifer Horkoff:
Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach. CAiSE 2014: 285-300 - [c12]Jennifer Horkoff, Fatma Basak Aydemir, Feng-Lin Li, Tong Li, John Mylopoulos:
Evaluating Modeling Languages: An Example from the Requirements Domain. ER 2014: 260-274 - [c11]Tong Li, Jennifer Horkoff, John Mylopoulos:
Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models. PoEM 2014: 208-223 - [c10]Tong Li, John Mylopoulos:
Modeling and Applying Security Patterns Using Contextual Goal Models. iStar 2014 - [c9]Jennifer Horkoff, Tong Li, Feng-Lin Li, Mattia Salnitri, Evellin Cardoso, Paolo Giorgini, John Mylopoulos, João Pimentel:
Taking goal models downstream: A systematic roadmap. RCIS 2014: 1-12 - 2011
- [j1]He Zhang, Lin Liu, Tong Li:
Designing IT systems according to environmental settings: A strategic analysis framework. J. Strateg. Inf. Syst. 20(1): 80-95 (2011) - [c8]Golnaz Elahi, Eric S. K. Yu, Tong Li, Lin Liu:
Security Requirements Engineering in the Wild: A Survey of Common Practices. COMPSAC 2011: 314-319 - [c7]Tianying Li, Tong Li, Haihua Xie, Lin Liu:
I*-Prefer: A Tool for Preference Model-Driven Decision Making. iStar 2011: 151-153 - [c6]Yudistira Asnar, Tong Li, Fabio Massacci, Federica Paci:
Computer Aided Threat Identification. CEC 2011: 145-152 - 2010
- [c5]Tuoye Xu, Tong Li, Lin Liu, Barrett R. Bryant:
Negotiating Service Requirements among Strategic Actors. COMPSAC Workshops 2010: 31-36 - [c4]Tong Li, Lin Liu, Golnaz Elahi, Eric S. K. Yu, Barrett R. Bryant:
Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint. COMPSAC Workshops 2010: 127-133 - [c3]Tong Li, Golnaz Elahi, Lin Liu, Eric S. K. Yu:
Automated Generation of Attack Routes for Service Security Analysis - A Preliminary Report. iStar 2010: 57-61 - [c2]Yunsong Jian, Tong Li, Lin Liu, Eric S. K. Yu:
Goal-oriented requirements modelling for running systems. RE@RunTime 2010: 1-8 - [c1]Lin Liu, Tong Li, Fei Peng:
Why Requirements Engineering Fails: A Survey Report from China. RE 2010: 317-322