메뉴 건너뛰기




Volumn 68 LNBIP, Issue , 2010, Pages 1-15

Comparing two techniques for intrusion visualization

Author keywords

experiment; requirements engineering; security; threat modeling

Indexed keywords

REQUIREMENTS ENGINEERING; VISUALIZATION;

EID: 78649956131     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-16782-9_1     Document Type: Conference Paper
Times cited : (24)

References (23)
  • 4
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting Security Requirements with Misuse Cases
    • Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering 10(1), 34-44 (2005)
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 7
    • 84911353933 scopus 로고    scopus 로고
    • accessed 4.6.2010
    • Unified Modeling Language, http://www.uml.org (accessed 4.6.2010)
  • 8
    • 0010381933 scopus 로고    scopus 로고
    • accessed 22.6.2010
    • Internet Security Glossary,http://www.apps.ietf.org/rfc/rfc2828.html (accessed 22.6.2010)
    • Internet Security Glossary
  • 9
    • 60949097689 scopus 로고    scopus 로고
    • Experimental comparison of attack trees and misuse cases for security threat identification
    • Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology 51(5), 916-932 (2009)
    • (2009) Information and Software Technology , vol.51 , Issue.5 , pp. 916-932
    • Opdahl, A.L.1    Sindre, G.2
  • 14
  • 17
    • 84911351763 scopus 로고    scopus 로고
    • accessed 24.6.2010
    • Karpati, P.: http://www.idi.ntnu.no/~kpeter/ExampleSheet-Group1.pdf (accessed 24.6.2010)
    • Karpati, P.1
  • 18
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use and user acceptance of information technology
    • Davis, F.D.: Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly 13, 319-340 (1989)
    • (1989) MIS Quarterly , vol.13 , pp. 319-340
    • Davis, F.D.1
  • 22
    • 4344598248 scopus 로고    scopus 로고
    • Evaluating the effect of a delegated versus centralized control style on the maintainability of object-oriented software
    • Arisholm, E., Sjøberg, D.I.K.: Evaluating the effect of a delegated versus centralized control style on the maintainability of object-oriented software. IEEE Transactions on Software Engineering 30, 521-534 (2004)
    • (2004) IEEE Transactions on Software Engineering , vol.30 , pp. 521-534
    • Arisholm, E.1    Sjøberg, D.I.K.2
  • 23
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: Toward a unified view. MIS Quarterly 27(3), 425-478 (2003)
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.