A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities (original) (raw)

Towards a risk-based security requirements engineering framework

Nicolas Mayer

2005

View PDFchevron_right

A Framework for Security Requirements Engineering

Robin Laney

Proceedings of the 2006 …, 2006

View PDFchevron_right

Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies

Ahmad Samer Wazan

Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

View PDFchevron_right

Guest editorial: security requirements engineering: past, present and future

Haris Mouratidis

Requirements Engineering, 2010

View PDFchevron_right

A modeling ontology for integrating vulnerabilities into security requirements conceptual foundations

Eric Yu

2009

View PDFchevron_right

A Comparison of Security Requirements Engineering Methods

Thomas Santen, Seda Gurses, Benjamin Fabian

View PDFchevron_right

Applying a security requirements engineering process

Daniel Mellado

2006

View PDFchevron_right

From goal-driven security requirements engineering to secure design

Haris Mouratidis

International Journal of Intelligent Systems, 2010

View PDFchevron_right

1 Security Requirements Engineering: A Survey

Hadar Ziv, D. Richardson

2008

View PDFchevron_right

Security Requirements Engineering: A Framework for Representation and Analysis

Robin Laney

IEEE Transactions on …, 2008

View PDFchevron_right

A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context

Ahmad Samer Wazan

Journal of Cybersecurity and Privacy, 2021

View PDFchevron_right

Defining Security Requirements Through Misuse Actions

Eduardo Fernandez

IFIP International Federation for Information Processing, 2006

View PDFchevron_right

A Requirements Engineering-Based Approach for Evaluating Security Requirements Engineering Methodologies

Ahmad Samer Wazan

Advances in Intelligent Systems and Computing, 2018

View PDFchevron_right

Towards a Catalogue of Reusable Security Requirements, Vulnerabilities and Threats

Alberto Da Silva

2018

View PDFchevron_right

Vulnerability Analysis Approach To Capturing Information System Safety Threats and Requirements

Oluwasefunmi Arogundade

View PDFchevron_right

A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven Engineering

Denisse Muñante

Lecture Notes in Computer Science, 2014

View PDFchevron_right

Security Requirements Engineering; State of the Art and Research Challenges

ali hadavi

2008

View PDFchevron_right

Introducing abuse frames for analysing security requirements

Ahmed ebrahem

Journal of Lightwave Technology

View PDFchevron_right

Based on a Security Requirements Engineering Process

Daniel Mellado

2010

View PDFchevron_right

An Aspect-Oriented Approach to Security Requirements Analysis

Kendall Nygard

30th Annual International Computer Software and Applications Conference (COMPSAC'06), 2006

View PDFchevron_right

COMPARATIVE LITERATURE ANALYSIS ON SECURITY REQUIREMENTS ENGINEERING

IJESRT Journal

View PDFchevron_right

Software Security Requirements Engineering: State of the Art

Muthu Ramachandran

Communications in Computer and Information Science, 2015

View PDFchevron_right

Validating Cyber Security Requirements: A Case Study

Frederick Sheldon

2011

View PDFchevron_right

Title: Security in Requirement Engineering for Qualitative Products

Isma Hameed

International Journal of Engineering and Technology, 2012

View PDFchevron_right

Security Risk Management by Qualitative Vulnerability Analysis

N. Zannone

2011 Third International Workshop on Security Measurements and Metrics, 2011

View PDFchevron_right

Security requirements engineering: The si*modeling language and the Secure Tropos methodology

N. Zannone

2010

View PDFchevron_right

A prototype tool for modeling and analyzing security requirements from a holistic viewpoint

Jennifer Horkoff

View PDFchevron_right

Security Requirements Engineering: Analysis and Prioritization

Shruti Jaiswal

View PDFchevron_right

Moving from Requirements to Design Confronting Security Issues: A Case Study

Spyros Halkidis

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Incorporating Security Requirements Engineering into the Dynamic Systems Development Method

Deepa Padmanabhan

2008

View PDFchevron_right