Holistic security requirements analysis: An attacker's perspective. Li, T., Paja, E., Mylopoulos, J., Horkoff, J., & Beckers, K. In Zowghi, D., Gervasi, V., & Amyot, D., editors, 23rd IEEE International Requirements Engineering Conference, RE 2015, Ottawa, ON, Canada, August 24-28, 2015, pages 282–283, 2015. IEEE Computer Society.
Paper doi bibtex @inproceedings{DBLP:conf/re/LiPMHB15,
author = {Tong Li and
Elda Paja and
John Mylopoulos and
Jennifer Horkoff and
Kristian Beckers},
editor = {Didar Zowghi and
Vincenzo Gervasi and
Daniel Amyot},
title = {Holistic security requirements analysis: An attacker's perspective},
booktitle = {23rd {IEEE} International Requirements Engineering Conference, {RE}
2015, Ottawa, ON, Canada, August 24-28, 2015},
pages = {282--283},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/RE.2015.7320439},
doi = {10.1109/RE.2015.7320439},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/re/LiPMHB15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"fubijwsF28a4PP3gi","bibbaseid":"li-paja-mylopoulos-horkoff-beckers-holisticsecurityrequirementsanalysisanattackersperspective-2015","author_short":["Li, T.","Paja, E.","Mylopoulos, J.","Horkoff, J.","Beckers, K."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Tong"],"propositions":[],"lastnames":["Li"],"suffixes":[]},{"firstnames":["Elda"],"propositions":[],"lastnames":["Paja"],"suffixes":[]},{"firstnames":["John"],"propositions":[],"lastnames":["Mylopoulos"],"suffixes":[]},{"firstnames":["Jennifer"],"propositions":[],"lastnames":["Horkoff"],"suffixes":[]},{"firstnames":["Kristian"],"propositions":[],"lastnames":["Beckers"],"suffixes":[]}],"editor":[{"firstnames":["Didar"],"propositions":[],"lastnames":["Zowghi"],"suffixes":[]},{"firstnames":["Vincenzo"],"propositions":[],"lastnames":["Gervasi"],"suffixes":[]},{"firstnames":["Daniel"],"propositions":[],"lastnames":["Amyot"],"suffixes":[]}],"title":"Holistic security requirements analysis: An attacker's perspective","booktitle":"23rd IEEE International Requirements Engineering Conference, RE 2015, Ottawa, ON, Canada, August 24-28, 2015","pages":"282–283","publisher":"IEEE Computer Society","year":"2015","url":"https://doi.org/10.1109/RE.2015.7320439","doi":"10.1109/RE.2015.7320439","timestamp":"Fri, 24 Mar 2023 00:00:00 +0100","biburl":"https://dblp.org/rec/conf/re/LiPMHB15.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/re/LiPMHB15,\n author = {Tong Li and\n Elda Paja and\n John Mylopoulos and\n Jennifer Horkoff and\n Kristian Beckers},\n editor = {Didar Zowghi and\n Vincenzo Gervasi and\n Daniel Amyot},\n title = {Holistic security requirements analysis: An attacker's perspective},\n booktitle = {23rd {IEEE} International Requirements Engineering Conference, {RE}\n 2015, Ottawa, ON, Canada, August 24-28, 2015},\n pages = {282--283},\n publisher = {{IEEE} Computer Society},\n year = {2015},\n url = {https://doi.org/10.1109/RE.2015.7320439},\n doi = {10.1109/RE.2015.7320439},\n timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/re/LiPMHB15.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Li, T.","Paja, E.","Mylopoulos, J.","Horkoff, J.","Beckers, K."],"editor_short":["Zowghi, D.","Gervasi, V.","Amyot, D."],"key":"DBLP:conf/re/LiPMHB15","id":"DBLP:conf/re/LiPMHB15","bibbaseid":"li-paja-mylopoulos-horkoff-beckers-holisticsecurityrequirementsanalysisanattackersperspective-2015","role":"author","urls":{"Paper":"https://doi.org/10.1109/RE.2015.7320439"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/92/5983.bib","dataSources":["dyTcuGxD57LtbxsL3"],"keywords":[],"search_terms":["holistic","security","requirements","analysis","attacker","perspective","li","paja","mylopoulos","horkoff","beckers"],"title":"Holistic security requirements analysis: An attacker's perspective","year":2015}