A systematic literature review of istar extensions

E Gonçalves, J Castro, J Araújo, T Heineck - Journal of Systems and …, 2018 - Elsevier
Abstract iStar is a general-purpose goal-based modelling language used to model
requirements at early and late phases of software development. It has been used in …

Reusable knowledge in security requirements engineering: a systematic map** study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …

A systematic approach to define the domain of information system security risk management

É Dubois, P Heymans, N Mayer… - … on information systems …, 2010 - Springer
Today, security concerns are at the heart of information systems, both at technological and
organizational levels. With over 200 practitioner-oriented risk management methods and …

Towards the development of privacy-aware systems

P Guarda, N Zannone - Information and Software Technology, 2009 - Elsevier
Privacy and data protection are pivotal issues in nowadays society. They concern the right to
prevent the dissemination of sensitive or confidential information of individuals. Many …

Brain: Behavior based adaptive intrusion detection in networks: Using hardware performance counters to detect ddos attacks

V Jyothi, X Wang, SK Addepalli… - 2016 29th international …, 2016 - ieeexplore.ieee.org
Denial-of-Service (DoS) and Distributed Denial-of Service (DDoS) attacks account for one
third of all service downtime incidents. Current DoS/DDoS attacks are not only limited to …

Evaluation of compliance rule languages for modelling regulatory compliance requirements

A Zasada, M Hashmi, M Fellmann, D Knuplesch - Software, 2023 - mdpi.com
Compliance in business processes has become a fundamental requirement given the
constant rise in regulatory requirements and competitive pressures that have emerged in …

Aligning social concerns with information system security: A fundamental ontology for social engineering

T Li, X Wang, Y Ni - Information Systems, 2022 - Elsevier
Along with the rapid development of socio-technical systems, people are playing an
increasingly important role in information system and have actually become an essential …

Security requirements engineering: A framework for cyber-physical systems

S ur Rehman, C Allgaier… - … International conference on …, 2018 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are complex evolution of classical software systems. These
systems integrate the physical layer with software systems, generating the ability for software …

Engineering of software-intensive systems: state of the art and research challenges

M Hölzl, A Rauschmayer, M Wirsing - Software-Intensive Systems and …, 2008 - Springer
Software-intensive systems become more and more important in our everyday lives. But
their increasing complexity makes it difficult to develop and maintain them. This chapter …

Modelling security and trust with secure tropos

P Giorgini, H Mouratidis, N Zannone - Integrating Security and …, 2007 - igi-global.com
Although the concepts of security and trust play an important issue in the development of
information systems, they have been mainly neglected by software engineering …