Author:
Banerjee C.,Banerjee Arpita,Poonia Ajeet Singh,Sharma S. K.
Reference10 articles.
1. Matulevicius, R., Mayer, N., Heymans, P.: Alignment of misuse cases with security risk management. In: Availability, Reliability and Security, 2008. ARES 08. Third International Conference on IEEE, pp. 1397–1404 (2008, March)
2. Abdulrazeg, A.A., Norwawi, N.M., Basir, N.: Security metrics to improve misuse case model. In: Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on IEEE, pp. 94–99 (2012, June)
3. Okubo, T., Taguchi, K., Kaiya, H., Yoshioka, N.: Masg: Advanced misuse case analysis model with assets and security goals. J. Inf. Process. 22(3), 536–546 (2014)
4. Malone, B., Siraj, A.: Tracking requirements and threats for secure software development. In: Proceedings of the 46th Annual Southeast Regional Conference on XX, pp. 278–281, ACM (2008, March)
5. Hartong, M., Goel, R., Wijesekera, D.: Meta-models for misuse cases. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, p. 33, ACM (2009, April)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献