Personal Information
Occupation
Assistant Professor
Industry
Technology / Software / Internet
About
Research Area- AI and NN, a certified ServiceNow trainer, author of 10+ books, received Best Academician Award and Best Achievement Award
holds a Ph.D. in Computer Science and is renowned for her student-centric teaching approach, fostering dynamic and engaging classroom environments that promote deep learning and academic excellence.
Tags
elicitation evaluation criteri
several elicitation methods
requirements elicitation
output from square steps
expected results
tools
the square process model
misuse and abuse cases
security requirements engineer
quality requirements
importance of requirement engg
the number and severity of cyb
software as a key target for t
software assurance and softwar
the problem
asserting and specifying the d
what makes software secure:
threats to software security
software security
secure communication safe communication
wings to your imagination
See more
Presentations
(4)Likes
(4)Requirements Engineering for Secure Software
Dr Sarika Jadhav
•
4 months ago
Software security: Security a Software Issue
Dr Sarika Jadhav
•
4 months ago
Data encryption techniques and standard
Dr Sarika Jadhav
•
4 years ago
Operator Overloading
Nilesh Dalvi
•
11 years ago
Personal Information
Occupation
Assistant Professor
Industry
Technology / Software / Internet
About
Research Area- AI and NN, a certified ServiceNow trainer, author of 10+ books, received Best Academician Award and Best Achievement Award
holds a Ph.D. in Computer Science and is renowned for her student-centric teaching approach, fostering dynamic and engaging classroom environments that promote deep learning and academic excellence.
Tags
elicitation evaluation criteri
several elicitation methods
requirements elicitation
output from square steps
expected results
tools
the square process model
misuse and abuse cases
security requirements engineer
quality requirements
importance of requirement engg
the number and severity of cyb
software as a key target for t
software assurance and softwar
the problem
asserting and specifying the d
what makes software secure:
threats to software security
software security
secure communication safe communication
wings to your imagination
See more