Author:
Wirtz Roman,Heisel Maritta
Publisher
Springer International Publishing
Reference22 articles.
1. Abeywardana, K., Pfluegel, E., Tunnicliffe, M.: A layered defense mechanism for a social engineering aware perimeter, pp. 1054–1062 (2016).
https://doi.org/10.1109/SAI.2016.7556108
2. Argyropoulos, N., Angelopoulos, K., Mouratidis, H., Fish, A.: Risk-aware decision support with constrained goal models. Inf. Comput. Secur. 26(4), 472–490 (2018).
https://doi.org/10.1108/ICS-01-2018-0010
3. Beckers, K.: Pattern and Security Requirements - Engineering-Based Establishment of Security Standards. Springer, Cham (2015).
https://doi.org/10.1007/978-3-319-16664-3
4. Common Criteria: Common Criteria for Information Technology Security Evaluation v3.1. Release 5. Standard (2017).
http://www.iso.org/iso/ catalogue_detail?csnumber=65694
5. Elahi, G., Yu, E., Zannone, N.: A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities. Requirements Eng. 15(1), 41–62 (2010).
https://doi.org/10.1007/s00766-009-0090-z
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献