• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Canedo ED, Bandeira IN, Gonçalves LP, Sales ADV, Mendonça F, Costa CA, de Sousa Jr. RT. Business Process Modeling Supporting the Requirements Elicitation of an Audit System. International Journal of Electronic Government Research 2023. [DOI: 10.4018/ijegr.320192] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/19/2023]
2
Canedo ED, Calazans ATS, Bandeira IN, Costa PHT, Masson ETS. Guidelines adopted by agile teams in privacy requirements elicitation after the Brazilian general data protection law (LGPD) implementation. Requir Eng 2022;27:545-567. [PMID: 36373010 PMCID: PMC9638239 DOI: 10.1007/s00766-022-00391-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/21/2022] [Accepted: 10/07/2022] [Indexed: 06/16/2023]
3
Dias Canedo E, Cordeiro Mendes B. Software Requirements Classification Using Machine Learning Algorithms. Entropy (Basel) 2020;22:E1057. [PMID: 33286826 PMCID: PMC7597130 DOI: 10.3390/e22091057] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/12/2020] [Revised: 09/02/2020] [Accepted: 09/03/2020] [Indexed: 11/16/2022]
4
Clara AMC, Canedo ED, de Sousa Júnior RT. A synthesis of common guidelines for regulatory compliance verification in the context of ICT governance audits1. IP 2018. [DOI: 10.3233/ip-170059] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
5
Pinheiro A, Dias Canedo E, de Sousa Junior RT, de Oliveira Albuquerque R, García Villalba LJ, Kim TH. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services. Sensors (Basel) 2018;18:s18030753. [PMID: 29498641 PMCID: PMC5876826 DOI: 10.3390/s18030753] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/30/2018] [Revised: 02/17/2018] [Accepted: 02/23/2018] [Indexed: 11/16/2022]
6
Canedo ED. Trust Model for Reliable File Exchange In Cloud Computing. ACTA ACUST UNITED AC 2012. [DOI: 10.5121/ijcsit.2012.4101] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA