共 50 条
- [32] Combining misuse cases with attack trees and security activity models FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 438 - 445
- [34] Logic-based methodology to help security architects in eliciting high-level network security requirements SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1610 - 1619
- [35] A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System 2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,
- [36] Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec Requirements Engineering, 2010, 15 : 63 - 93
- [37] Constructing Security Cases Based on Formal Verification of Security Requirements in Alloy COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2023 WORKSHOPS, 2023, 14182 : 15 - 25