Survey of cyber risk analysis techniques for use in the nuclear industry

S Eggers, K Le Blanc - Progress in Nuclear Energy, 2021 - Elsevier
Using traditional probabilistic risk analysis methods for severe accident safety risk
management on non-digital systems, structures, and components at nuclear power plants is …

Automatic requirements engineering: Activities, methods, tools, and domains–a systematic literature review

R Delima, K Mustofa, AK Sari - Jurnal RESTI-Rekayasa Sistem …, 2023 - katalog.ukdw.ac.id
Requirements engineering (RE) is an initial activity in the software engineering process that
involves many users. The involvement of various users in the RE process raises ambiguity …

[PDF][PDF] CVSS-based Estimation and Prioritization for Security Risks.

R Wirtz, M Heisel - ENASE, 2019 - scitepress.org
During software development, it is of essential importance to consider security threats. The
number of reported incidents and the harm for organizations due to such incidents highly …

Top Management and Organizational Support for Information Security as Perceived by US Healthcare Employees: A Quantitative Study

V Anderson - 2022 - search.proquest.com
The purpose of this study was to explore the extent to which top management commitment to
information security compliance predicts organizational support as perceived by the …

Model-based risk analysis and evaluation using CORAS and CVSS

R Wirtz, M Heisel - Evaluation of Novel Approaches to Software …, 2020 - Springer
The consideration of security during software development is an important factor for
deploying high-quality software. The later one considers security in a software development …

Optimization Modulo Theories with OptiMathSAT

P Trentin - 2019 - eprints-phd.biblio.unitn.it
In the contexts of Formal Verification (FV) and Automated Reasoning (AR), Satisfiability
Modulo Theories (SMT) is an important discipline that allows for dealing with industrial-level …

Implementation and Design of Secure Business Process Models Based on Organisational Goals

A Patrick - 2022 - researchsquare.com
Business processes are essential instruments used for the coordination of organisational
activities in order to produce value in the form of products and services. Information security …

[PDF][PDF] Designing secure business processes from organisational goal models

N Argyropoulos - 2018 - core.ac.uk
Business processes are essential instruments used for the coordination of organisational
activities in order to produce value in the form of products and services. Information security …

[PDF][PDF] Managing Security Risks During Requirements Engineering

R Wirtz - 2021 - d-nb.info
Due to the ongoing digitalization of our everyday life, the consideration of security for
software-intensive systems is of great importance. The number of reported security incidents …