Threat analysis of software systems: A systematic literature review

K Tuma, G Calikli, R Scandariato - Journal of Systems and Software, 2018 - Elsevier
Architectural threat analysis has become an important cornerstone for organizations
concerned with develo** secure software. Due to the large number of existing techniques …

[PDF][PDF] Goal-oriented requirements engineering: An overview of the current research

A Lapouchnian - University of Toronto, 2005 - researchgate.net
The main measure of the success of a software system is the degree to which it meets its
purpose. Therefore, identifying this purpose must be one of the main activities in the …

Modeling cyber–physical systems

P Derler, EA Lee, AS Vincentelli - Proceedings of the IEEE, 2011 - ieeexplore.ieee.org
This paper focuses on the challenges of modeling cyber–physical systems (CPSs) that arise
from the intrinsic heterogeneity, concurrency, and sensitivity to timing of such systems. It …

Towards achieving data security with the cloud computing adoption framework

V Chang, M Ramachandran - IEEE Transactions on services …, 2015 - ieeexplore.ieee.org
Offering real-time data security for petabytes of data is important for cloud computing. A
recent survey on cloud security states that the security of users' data has the highest priority …

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

M Deng, K Wuyts, R Scandariato, B Preneel… - Requirements …, 2011 - Springer
Ready or not, the digitalization of information has come, and privacy is standing out there,
possibly at stake. Although digital privacy is an identified priority in our society, few …

Eliciting security requirements with misuse cases

G Sindre, AL Opdahl - Requirements engineering, 2005 - Springer
Use cases have become increasingly common during requirements engineering, but they
offer limited support for eliciting security threats and requirements. At the same time, the …

On non-functional requirements in software engineering

L Chung, JCS do Prado Leite - … and applications: Essays in honor of john …, 2009 - Springer
Essentially a software system's utility is determined by both its functionality and its non-
functional characteristics, such as usability, flexibility, performance, interoperability and …

Security requirements engineering: A framework for representation and analysis

C Haley, R Laney, J Moffett… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper presents a framework for security requirements elicitation and analysis. The
framework is based on constructing a context for the system, representing security …

Feature selection for clustering-a filter solution

M Dash, K Choi, P Scheuermann… - 2002 IEEE International …, 2002 - ieeexplore.ieee.org
Processing applications with a large number of dimensions has been a challenge for the
KDD community. Feature selection, an effective dimensionality reduction technique, is an …

Assessing information security risks in the cloud: A case study of Australian local government authorities

O Ali, A Shrestha, A Chatfield, P Murray - Government Information Quarterly, 2020 - Elsevier
Cloud computing enables cost-effective and scalable growth of IT services that can enhance
government services. Despite the Australian Federal Government's 'cloud-first'strategy and …