참고문헌
- Tolk, A., Diallo, S., Padilla, J., Herencia-Zapana, H.: Reference Modelling in Support of M&S-Foundations and Applications. J Simulation 7, 69-82 (2013). https://doi.org/10.1057/jos.2013.3
- Guarino, N., Guizzardi, G., Mylopoulos, J.: On the Philosophical Foundations of Conceptual Models. In: 29th EJC International Conference on Information Modelling and Knowledge Bases (EJC). Lappeenranta, Finland (2019)
- Brooks, F.: No Silver Bullet: Essence and Accidents of Software Engineering. Computer Volume, IEEE Computer 20 (4), 10-19 (1987) https://doi.org/10.1109/MC.1987.1663532
- Insfran, E., Pastor, O., Wieringa, R.: Requirements Engineering-Based Conceptual Modeling. Requirements Engineering 7(2), 61-72 (2002) https://doi.org/10.1007/s007660200005
- Sharma, R., Sharma, S., Singh, S.: Future Challenges and Opportunities of Systems and Software Engineering Processes. International Journal of Computer Science and Information Technologies 2(5), 2176-2179 (2011)
- Pressman, R.S., Maxim, B.R.: Software Engineering: A Practitioner's Approach, Eighth Edition. McGraw-Hill Education, New York, NY (2015)
- Oliver, R.: Why the Software Industry Has a Love-Hate Relationship with UML Diagrams. 19 October 2017. Accessed 12 January 2021. https://creately.com/blog/diagrams/advantages-anddisadvantages-of-uml/
- Fairbanks, G.: Losing the Battle with Complexity. 28 February 2016. Accessed 12 January 2021. https://www.georgefairbanks.com/blog/losing-thecomplexity-battle/
- Chren, S., Buhnova, B., Macak, M., Daubner, L., Rossi, B.: Mistakes in UML Diagrams: Analysis of Student Projects in a Software Engineering Course. In: Mistakes in UML Diagrams (2019). DOI: 10.1109/ICSE-SEET.2019.00019
- Boberic-Krsticev, D., Tesendic, D.: Experience in Teaching OOAD to Various Students. Informatics in Education 12(1), 43-58 (2013) https://doi.org/10.15388/infedu.2013.04
- Peleg, M., Dori, D.: The Model Multiplicity Problem: Experimenting with Real-Time Specification Methods. IEEE Transactions on Software Engineering 26(8), 742-759 (2000) https://doi.org/10.1109/32.879812
- Lin, K., Shen, C., Chao, W.: Enriching UML from Model Multiplicity to Model Singularity with Structure-Behavior Coalescence. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). Miyazaki, Japan (2018). DOI: 10.1109/SMC.2018.00340
- Egyed, A.: Integrating Architectural Views in UML, Technical Report USC/CSE-99-TR-514, University of Southern California, Center for Software Engineering, March 10, 1999.
- IEEE: Recommended Practice for Architectural Description for Software-Intensive Systems. IEEE, New York, NY (Oct. 2000)
- Whittle, J., Jayaraman, P., Elkhodary, A., Moreira, A., Araujo, J.: MATA: A Unified Approach for Composing UML Aspect Models Based on Graph Transformation. In: Katz, S., Ossher, H., France, R., Jezequel J.M. (eds.) Transactions on Aspect-Oriented Software Development VI. Lecture Notes in Computer Science, vol. 5560, pp. 191-237. Springer, Berlin, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03764-1_6, 191-237
- Kruchten, P.: Architectural Blueprints. The "4+1" View Model of Software Architecture. IEEE Software 12(6), 42-50 (1995) https://doi.org/10.1109/52.469759
- Wang, R.: Search-Based System Architecture Development Using a Holistic Elopment Using a Holistic Modeling Approach. Missouri University of Science and Technology. Doctoral Dissertations 2256, Fall 2012.
- Al-Fedaghi, S.: Modeling in Systems Engineering: Conceptual Time Representation. International Journal of Computer Science and Network Security, 21(3), 153-164 (2021). doi.org/10.22937/IJCSNS.2021.21.3.21
- Al-Fedaghi, S.: UML Modeling to TM Modeling and Back. International Journal of Computer Science and Network Security 21(1), 84-96 (2021). doi.org/10.22937/IJCSNS.2021.21.1.13
- Al-Fedaghi, S.: Advancing Behavior Engineering: Toward Integrated Events Modeling. International Journal of Computer Science and Network Security 20(12), 95-107 (2020). doi.org/10.22937/IJCSNS.2020.20.12.10
- Al-Fedaghi, S., BehBehani, M.: Thinging Machine Applied to Information Leakage. International Journal of Advanced Computer Science and Applications 9(9), 101-110, (2018). DOI: 10.14569/IJACSA.2018.090914
- Al-Fedaghi, S., Alrashed, A.: Threat Risk Modeling. In: Second International Conference on Communication Software and Networks, pp. 405-411, Singapore, 26-28 Feb, (2010). doi.org/10.1109/ICCSN.2010.29
- Al-Fedaghi, S., Fiedler, G., Thalheim, B.: Privacy Enhanced Information Systems. In: The 15th European-Japanese Conference on Information Modeling and Knowledge. Frontiers in Artificial Intelligence and Applications, Tallinn, Estonia, May 16-20, 2005. In: Kiyoki, Y., Lastname, X. (eds.) Information Modeling and Knowledge Bases XVII. Book, vol. 136, pp. 94-111. IOS Press, (2006). ISBN 978-1-58603-591-4
- Al-Fedaghi, S.: Conceptual Temporal Modeling Applied to Databases. International Journal of Advanced Computer Science and Applications (IJACSA), 12(1), 524-534 (2021). DOI: 10.14569/IJACSA.2021.0120161
- Al-Fedaghi, S.: UML Modeling to TM Modeling and Back. IJCSNS International Journal of Computer Science and Network Security 21(1), 84-96 (2021). DOI: 10.22937/IJCSNS.2021.21.1.13
- Al-Fedaghi, S.: Conceptual Software Engineering Applied to Movie Scripts and Stories. Journal of Computer Science, 16(12), 1718-1730 (2020). DOI: 10.3844/jcssp.2020.1718.1730
- Al-Fedaghi, A., Alahmad, H.: Process Description, Behavior, and Control. International Journal of Computer Science and Information Security 15(7), 124-133 (2017)
- Bogost, I.: Unit Operations: An Approach to Videogame Criticism. The MIT Press, Cambridge, MA (2008)
- Siegfried, S.: Understanding Object-Oriented Software Engineering. IEEE Press, New York (1996).