Holistic security requirements analysis: An attacker's perspective. Li, T., Paja, E., Mylopoulos, J., Horkoff, J., & Beckers, K. In Zowghi, D., Gervasi, V., & Amyot, D., editors, 23rd IEEE International Requirements Engineering Conference, RE 2015, Ottawa, ON, Canada, August 24-28, 2015, pages 282–283, 2015. IEEE Computer Society.
Holistic security requirements analysis: An attacker's perspective [link]Paper  doi  bibtex   
@inproceedings{DBLP:conf/re/LiPMHB15,
  author       = {Tong Li and
                  Elda Paja and
                  John Mylopoulos and
                  Jennifer Horkoff and
                  Kristian Beckers},
  editor       = {Didar Zowghi and
                  Vincenzo Gervasi and
                  Daniel Amyot},
  title        = {Holistic security requirements analysis: An attacker's perspective},
  booktitle    = {23rd {IEEE} International Requirements Engineering Conference, {RE}
                  2015, Ottawa, ON, Canada, August 24-28, 2015},
  pages        = {282--283},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/RE.2015.7320439},
  doi          = {10.1109/RE.2015.7320439},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/LiPMHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0