Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Systems Engineering

Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann Oct 2022

Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann

Doctoral Dissertations and Master's Theses

The focus of this research is to develop an approach that enhances the elicitation and specification of reusable cybersecurity requirements. Cybersecurity has become a global concern as cyber-attacks are projected to cost damages totaling more than $10.5 trillion dollars by 2025. Cybersecurity requirements are more challenging to elicit than other requirements because they are nonfunctional requirements that requires cybersecurity expertise and knowledge of the proposed system. The goal of this research is to generate cybersecurity requirements based on knowledge acquired from requirements elicitation and analysis activities, to provide cybersecurity specifications without requiring the specialized knowledge of a cybersecurity expert, and …


Supervised Representation Learning For Improving Prediction Performance In Medical Decision Support Applications, Phawis Thammasorn May 2022

Supervised Representation Learning For Improving Prediction Performance In Medical Decision Support Applications, Phawis Thammasorn

Graduate Theses and Dissertations

Machine learning approaches for prediction play an integral role in modern-day decision supports system. An integral part of the process is extracting interest variables or features to describe the input data. Then, the variables are utilized for training machine-learning algorithms to map from the variables to the target output. After the training, the model is validated with either validation or testing data before making predictions with a new dataset. Despite the straightforward workflow, the process relies heavily on good feature representation of data. Engineering suitable representation eases the subsequent actions and copes with many practical issues that potentially prevent the …