Threat analysis of software systems: A systematic literature review

K Tuma, G Calikli, R Scandariato - Journal of Systems and Software, 2018‏ - Elsevier
Architectural threat analysis has become an important cornerstone for organizations
concerned with develo** secure software. Due to the large number of existing techniques …

[HTML][HTML] System security assurance: A systematic literature review

A Shukla, B Katt, LO Nweke, PK Yeng… - Computer Science …, 2022‏ - Elsevier
Abstract System security assurance provides the confidence that security features, practices,
procedures, and architecture of software systems mediate and enforce the security policy …

Describing objects by their attributes

A Farhadi, I Endres, D Hoiem… - 2009 IEEE conference on …, 2009‏ - ieeexplore.ieee.org
We propose to shift the goal of recognition from naming to describing. Doing so allows us
not only to name familiar objects, but also: to report unusual aspects of a familiar object …

A goal-based framework for contextual requirements modeling and analysis

R Ali, F Dalpiaz, P Giorgini - Requirements engineering, 2010‏ - Springer
Requirements engineering (RE) research often ignores or presumes a uniform nature of the
context in which the system operates. This assumption is no longer valid in emerging …

[HTML][HTML] STORE: Security threat oriented requirements engineering methodology

MTJ Ansari, D Pandey, M Alenezi - … of King Saud University-Computer and …, 2022‏ - Elsevier
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …

A descriptive study of Microsoft's threat modeling technique

R Scandariato, K Wuyts, W Joosen - Requirements Engineering, 2015‏ - Springer
Microsoft's STRIDE is a popular threat modeling technique commonly used to discover the
security weaknesses of a software system. In turn, discovered weaknesses are a major …

A comparison of security requirements engineering methods

B Fabian, S Gürses, M Heisel, T Santen… - Requirements …, 2010‏ - Springer
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …

An overview: security issue in IoT network

R Gurunath, M Agarwal, A Nandi… - … I-SMAC) I-SMAC (IoT in …, 2018‏ - ieeexplore.ieee.org
The IoT expedients are formed on cost-effective devices and wireless communique methods
to connect with each other and propel mobile facts to the Unified system. This paper focuses …

A serious game for eliciting social engineering security requirements

K Beckers, S Pape - 2016 IEEE 24th International …, 2016‏ - ieeexplore.ieee.org
Social engineering is the acquisition of information about computer systems by methods that
deeply include nontechnical means. While technical security of most critical systems is high …

Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements

C Negri-Ribalta, M Lombard-Platet… - Requirements Engineering, 2024‏ - Springer
Data protection compliance is critical from a requirements engineering (RE) perspective,
both from a software development lifecycle (SDLC) perspective and regulatory compliance …