-
1
-
-
53849146921
-
-
Master's Thesis, School of Engineering, Blekinge Institute of Technology, Ronneby, Sweden
-
Ahl V (2005) An experimental comparison of five prioritization methods. Master's Thesis, School of Engineering, Blekinge Institute of Technology, Ronneby, Sweden.
-
(2005)
An experimental comparison of five prioritization methods
-
-
Ahl, V.1
-
4
-
-
80054991493
-
A scenario-based approach for requirements elicitation for software systems complying with the utilization of ubiquitous computing technologies
-
Munich, Germany doi: 10. 1109/COMPSACW. 2011. 63
-
Alawairdhi M, Aleisa E (2011) A scenario-based approach for requirements elicitation for software systems complying with the utilization of ubiquitous computing technologies. In: The 35th IEEE annual computer software and applications conference workshops (COMPSACW), Munich, Germany, pp 341-344. doi: 10. 1109/COMPSACW. 2011. 63.
-
(2011)
The 35th IEEE annual computer software and applications conference workshops (COMPSACW)
, pp. 341-344
-
-
Alawairdhi, M.1
Aleisa, E.2
-
5
-
-
79451469012
-
A goal-based framework for contextual requirements modeling and analysis
-
Ali R, Dalpiaz F, Giorgini P (2010) A goal-based framework for contextual requirements modeling and analysis. Require Eng 15(4): 439-458.
-
(2010)
Requirements Engineering
, vol.15
, Issue.4
, pp. 439-458
-
-
Ali, R.1
Dalpiaz, F.2
Giorgini, P.3
-
6
-
-
1542300204
-
Securing critical information and communication infrastructures through electric power grid independence
-
Yokohama, Japan
-
Allen W, Fletcher D, Fellhoelter K (2004) Securing critical information and communication infrastructures through electric power grid independence. In: The 25th IEEE international telecommunications energy conference (INTELEC'03), Yokohama, Japan, pp 170-177.
-
(2004)
The 25th IEEE international telecommunications energy conference (INTELEC'03)
, pp. 170-177
-
-
Allen, W.1
Fletcher, D.2
Fellhoelter, K.3
-
7
-
-
27744595750
-
Toward a smart grid: power delivery for the 21st century
-
doi: 10. 1109/MPAE. 2005. 1507024
-
Amin M, Wollenberg B (2005) Toward a smart grid: power delivery for the 21st century. IEEE Power Energy Mag 3(5): 34-41. doi: 10. 1109/MPAE. 2005. 1507024.
-
(2005)
IEEE Power Energy Mag
, vol.3
, Issue.5
, pp. 34-41
-
-
Amin, M.1
Wollenberg, B.2
-
9
-
-
4243980729
-
Strategies for developing policies and requirements for secure e-commerce systems
-
In: Ghosh AK (ed) Kluwer Academic Publishers
-
Antón Al, Earp JB (2001) Strategies for developing policies and requirements for secure e-commerce systems. In: Ghosh AK (ed) Recent advances in e-commerce security and privacy. Kluwer Academic Publishers, pp 29-46.
-
(2001)
Recent advances in e-commerce security and privacy
, pp. 29-46
-
-
Antón, A.1
Earp, J.B.2
-
10
-
-
0003827816
-
Extreme programming explained: embrace change
-
Beck K (2000) Extreme programming explained: embrace change. Addison-Wesley Professional.
-
(2000)
Addison-Wesley Professional
-
-
Beck, K.1
-
11
-
-
67649653902
-
Networking AMI smart meters
-
Atlanta, Georgia doi: 10. 1109/ENERGY. 2008. 4781067
-
Bennett C, Highfill D (2008) Networking AMI smart meters. In: IEEE Energy 2030 conference, Atlanta, Georgia, pp 1-8. doi: 10. 1109/ENERGY. 2008. 4781067.
-
(2008)
IEEE Energy 2030 conference
, pp. 1-8
-
-
Bennett, C.1
Highfill, D.2
-
12
-
-
0024681034
-
Theory-w software project management principles and examples
-
Boehm B, Ross R (1989) Theory-w software project management principles and examples. IEEE Trans Softw Eng 15(7): 902-916.
-
(1989)
IEEE Trans Software Eng
, vol.15
, Issue.7
, pp. 902-916
-
-
Boehm, B.1
Ross, R.2
-
14
-
-
0036036577
-
Security attribute evaluation method: a cost-benefit approach
-
Orlando, Florida doi: 10. 1145/581339. 581370
-
Butler S (2002) Security attribute evaluation method: a cost-benefit approach. In: Proceedings of the 24th ACM international conference on software engineering. Orlando, Florida, pp 232-240. doi: 10. 1145/581339. 581370.
-
(2002)
Proceedings of the 24th ACM international conference on software engineering
, pp. 232-240
-
-
Butler, S.1
-
15
-
-
84974753217
-
Soft system methodology
-
Checkland P (1989) Soft system methodology. Human Syst Manage 8(4): 273-289.
-
(1989)
Human Systems Management
, vol.8
, Issue.4
, pp. 273-289
-
-
Checkland, P.1
-
16
-
-
84860047721
-
-
CMU/SEI-2006-SR-003. Software Engineering Institute, Carnegie Mellon University, Pittsburgh
-
Chung L, Hung F, Hough E, Ojoko-Adams D, Mead N (2006) Security quality requirements engineering (SQUARE): case study phase III. Tech. rep., CMU/SEI-2006-SR-003. Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
-
(2006)
Security quality requirements engineering (SQUARE): Case study phase III. Tech. rep
-
-
Chung, L.1
Hung, F.2
Hough, E.3
Ojoko-Adams, D.4
Mead, N.5
-
18
-
-
0034845823
-
DDP-A tool for life-cycle risk management
-
Big Sky, MT doi: 10. 1109/AERO. 2001. 931736
-
Cornford S, Feather M, Hicks K (2001) DDP-A tool for life-cycle risk management. In: IEEE Proceedings of aerospace conference, vol 1. Big Sky, MT, pp 1/441-1/451. doi: 10. 1109/AERO. 2001. 931736.
-
(2001)
IEEE Proceedings of aerospace conference
, vol.1
, pp. 441-451
-
-
Cornford, S.1
Feather, M.2
Hicks, K.3
-
19
-
-
84881612893
-
-
0, December 2005
-
Corporation M (2011) Glossary, MSDN, web service security: scenarios, patterns, and implementation guidance for web services enhancements (WSE) 3. 0, December 2005. http://msdn. microsoft. com/en-us/library/aa480547. aspx.
-
(2011)
Glossary, MSDN, web service security: Scenarios, patterns, and implementation guidance for web services enhancements (WSE) 3
-
-
Corporation, M.1
-
22
-
-
0030615545
-
Grail/kaos: an environment for goal-driven requirements engineering
-
Boston, Massachusetts doi: 10. 1145/253228. 253499
-
Darimont R, Delor E, Massonet P, van Lamsweerde A (1997) Grail/kaos: an environment for goal-driven requirements engineering. In: Proceedings of the 19th ACM international conference on software engineering (ICSE '97). Boston, Massachusetts, pp 612-613. doi: 10. 1145/253228. 253499.
-
(1997)
Proceedings of the 19th ACM international conference on software engineering (ICSE '97)
, pp. 612-613
-
-
Darimont, R.1
Delor, E.2
Massonet, P.3
van Lamsweerde, A.4
-
23
-
-
0037339884
-
The art of requirements triage
-
doi:10.1109/MC.2003.1185216
-
Davis A (2003) The art of requirements triage. IEEE Computer 36(3): 42-49. doi: 10. 1109/MC. 2003. 1185216.
-
(2003)
IEEE Computer
, vol.36
, Issue.3
, pp. 42-49
-
-
Davis, A.1
-
25
-
-
33947368645
-
Model-based security analysis in seven steps a guided tour to the CORAS method
-
doi:10.1007/s10550-007-0013-9
-
Den Braber F, Hogganvik I, Lund M, Stolen K, Vraalsen F (2007) Model-based security analysis in seven steps a guided tour to the CORAS method. BT Technol J 25(1): 101-117. doi: 10. 1007/s10550-007-0013-9.
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 101-117
-
-
Den Braber, F.1
Hogganvik, I.2
Lund, M.3
Stolen, K.4
Vraalsen, F.5
-
27
-
-
38349123642
-
A goal oriented approach for modeling and analyzing security trade-offs
-
Springer, Berlin
-
Elahi G, Yu E (2007) A goal oriented approach for modeling and analyzing security trade-offs. In: Proceedings of the 26th international conference on Conceptual modeling, ER'07. Springer, Berlin, pp 375-390. http://dl. acm. org/citation. cfm?id=1784489. 1784524.
-
(2007)
Proceedings of the 26th international conference on Conceptual modeling, ER'07
, pp. 375-390
-
-
Elahi, G.1
Yu, E.2
-
28
-
-
77954005795
-
Cyber Security and Power System Communication Essential Parts of a Smart Grid Infrastructure
-
Ericsson G (2010) Cyber security and power system communication essential parts of a smart grid infrastructure. IEEE Trans Power Deliv 25(3): 1501-1507.
-
(2010)
IEEE Trans Power Delivery
, vol.25
, Issue.3
, pp. 1501-1507
-
-
Ericsson, G.1
-
29
-
-
77950536938
-
A comparison of security requirements engineering methods
-
Fabian B, Gurses S, Heisel M, Santen T, Schmidt H (2010) A comparison of security requirements engineering methods. Require Eng 15(1): 7-40.
-
(2010)
Requirements Engineering
, vol.15
, Issue.1
, pp. 7-40
-
-
Fabian, B.1
Gurses, S.2
Heisel, M.3
Santen, T.4
Schmidt, H.5
-
30
-
-
73649137161
-
The path of the smart grid
-
Farhangi H (2009) The path of the smart grid. IEEE Power Energy Mag 8(1): 18-28.
-
(2009)
IEEE Power Energ Mag
, vol.8
, Issue.1
, pp. 18-28
-
-
Farhangi, H.1
-
32
-
-
78649624431
-
NIST interoperability framework and action plans
-
Minneapolis doi: 10. 1109/PES. 2010. 5589699
-
FitzPatrick G, Wollman D (2010) NIST interoperability framework and action plans. In: IEEE power and energy society general meeting, Minneapolis, pp 1-4. doi: 10. 1109/PES. 2010. 5589699.
-
(2010)
IEEE power and energy society general meeting
, pp. 1-4
-
-
FitzPatrick, G.1
Wollman, D.2
-
33
-
-
0036911326
-
Understanding and evaluating qualitative research
-
Fossey E, Harvey C, McDermott F, Davidson L (2002) Understanding and evaluating qualitative research. Aust NZ J Psych 36(6): 717-732.
-
(2002)
Aust N Z J Psychiatry
, vol.36
, Issue.6
, pp. 717-732
-
-
Fossey, E.1
Harvey, C.2
McDermott, F.3
Davidson, L.4
-
34
-
-
4544227055
-
The future's smart delivery system [electric power supply]
-
Gellings C, Samotyj M, Howe B (2004) The future's smart delivery system [electric power supply]. IEEE Power Energy Mag 2(5): 40-48.
-
(2004)
IEEE Power Energ Mag
, vol.2
, Issue.5
, pp. 40-48
-
-
Gellings, C.1
Samotyj, M.2
Howe, B.3
-
35
-
-
84873162530
-
-
Special rep., CMU/SEI-2005-SR-005. Software Engineering Institute, Carnegie Mellon University, Pittsburgh
-
Gordon D, Stehney T, Wattas N, Yu E (2005) System quality requirements engineering (SQUARE): case study on asset management system, phase II. Special rep., CMU/SEI-2005-SR-005. Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
-
(2005)
System quality requirements engineering (SQUARE): Case study on asset management system, phase II
-
-
Gordon, D.1
Stehney, T.2
Wattas, N.3
Yu, E.4
-
38
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
Haley C, Laney R, Moffett J, Nuseibeh B (2008) Security requirements engineering: a framework for representation and analysis. IEEE Trans on Softw Eng 34(1): 133-153.
-
(2008)
IEEE Trans Software Eng
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
40
-
-
0141885086
-
Evaluation of qualitative research
-
Horsburgh D (2003) Evaluation of qualitative research. J Clin Nurs 12(2): 307-312.
-
(2003)
J Clin Nurs
, vol.12
, Issue.2
, pp. 307-312
-
-
Horsburgh, D.1
-
42
-
-
0033683937
-
An assessment of the relative efficiency of a facilitator-driven requirements collection process with respect to the conventional interview method
-
Schaumburg, IL doi: 10. 1109/ICRE. 2000. 855608
-
Hubbard R, Schroeder C, Mead N (2000) An assessment of the relative efficiency of a facilitator-driven requirements collection process with respect to the conventional interview method. In: Proceedings of 4th IEEE international conference on requirements engineering. Schaumburg, IL, pp 178-186. doi: 10. 1109/ICRE. 2000. 855608.
-
(2000)
Proceedings of 4th IEEE international conference on requirements engineering
, pp. 178-186
-
-
Hubbard, R.1
Schroeder, C.2
Mead, N.3
-
44
-
-
50249112803
-
Use cases and scenarios engineering
-
Dubai, United Arab Emirates. doi: 10. 1109/IIT. 2007. 4430418
-
Jakimi A, Sabraoui A, Badidi E, Idri A, El Koutbi M (2007) Use cases and scenarios engineering. In: 4th IEEE international conference on innovations in information technology (IIT '07), Dubai, United Arab Emirates, pp 521-525. doi: 10. 1109/IIT. 2007. 4430418.
-
(2007)
4th IEEE international conference on innovations in information technology (IIT '07)
, pp. 521-525
-
-
Jakimi, A.1
Sabraoui, A.2
Badidi, E.3
Idri, A.4
El Koutbi, M.5
-
46
-
-
0003512056
-
-
Tech. rep., CMU/SEI-90-TR-021. Software Engineering Institute, Carnegie Mellon University, Pittsburgh
-
Kang K, Cohen S, Hess J, Novak W, Peterson A (1990) Feature-oriented domain analysis (FODA) feasibility study. Tech. rep., CMU/SEI-90-TR-021. Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
-
(1990)
Feature-oriented domain analysis (FODA) feasibility study
-
-
Kang, K.1
Cohen, S.2
Hess, J.3
Novak, W.4
Peterson, A.5
-
47
-
-
0041307366
-
-
Department of Computer and Information science, Linkoping University, Linkoping, Sweden, Licentiate thesis 513
-
Karlsson J (1995) Towards a strategy for software requirements selection. Department of Computer and Information science, Linkoping University, Linkoping, Sweden, Licentiate thesis 513.
-
(1995)
Towards a strategy for software requirements selection
-
-
Karlsson, J.1
-
49
-
-
0031234218
-
A cost-value approach for prioritizing requirements
-
doi:10.1109/52.605933
-
Karlsson J, Ryan K (1997) A cost-value approach for prioritizing requirements. IEEE Software 14(5): 67-74. doi: 10. 1109/52. 605933.
-
(1997)
IEEE Software
, vol.14
, Issue.5
, pp. 67-74
-
-
Karlsson, J.1
Ryan, K.2
-
50
-
-
77249138261
-
Smart-Grid Security Issues
-
Khurana H, Hadley M, Lu N, Frincke D (2010) Smart-Grid Security Issues. IEEE Secur Priv 8(1): 81-85.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.1
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Lu, N.3
Frincke, D.4
-
51
-
-
0004120213
-
-
Working Paper No 131, Institute of Urban and Regional Development, University of California, Berkeley, CA
-
Kunz W, Rittel H (1970) Issues as elements of information systems. Working Paper No 131, Institute of Urban and Regional Development, University of California, Berkeley, CA.
-
(1970)
Issues as elements of information systems
-
-
Kunz, W.1
Rittel, H.2
-
55
-
-
79955143136
-
SecureUML: a UML-based modeling language for model-driven security
-
doi: 10. 1007/3-540-45800-X_33
-
Lodderstedt T, Basin D, Doser J (2002) SecureUML: a UML-based modeling language for model-driven security. UML The Unified Modeling Language, Lecture Notes in Computer Science, Springer, vol 2460/2002, pp 426-441. doi: 10. 1007/3-540-45800-X_33.
-
(2002)
UML The Unified Modeling Language, Lecture Notes in Computer Science, Springer, vol 2460/2002
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
56
-
-
77955027376
-
Energy theft in the advanced metering infrastructure
-
doi: 10. 1007/978-3-642-14379-3_15
-
McLaughlin S, Podkuiko D, McDaniel P (2010) Energy theft in the advanced metering infrastructure. Critic Inform Infrastruct Secur, Lecture Notes in Computer Science, vol 6027/2010, pp 176-187. doi: 10. 1007/978-3-642-14379-3_15.
-
(2010)
Critic Inform Infrastruct Secur, Lecture Notes in Computer Science, vol 6027/2010
, pp. 176-187
-
-
McLaughlin, S.1
Podkuiko, D.2
McDaniel, P.3
-
58
-
-
0042457632
-
-
Tech. rep., CMU/SEI-2000-TR-013. Software Engineering Institute, Carnegie Mellon University, Pittsburgh
-
Mead N, Ellison R, Linger R, Longstaff T, McHugh J (2000) Survivable network analysis method. Tech. rep., CMU/SEI-2000-TR-013. Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
-
(2000)
Survivable network analysis method
-
-
Mead, N.1
Ellison, R.2
Linger, R.3
Longstaff, T.4
McHugh, J.5
-
59
-
-
70349553280
-
-
Technical Note, CMU/SEI-2008-TN-006. Software Engineering Institute, Carnegie Mellon University, Pittsburgh
-
Mead N, Viswanathan V, Padmanabhan D (2008) Incorporating security quality requirements engineering (SQUARE) into standard life-cycle models. Technical Note, CMU/SEI-2008-TN-006. Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
-
(2008)
Incorporating security quality requirements engineering (SQUARE) into standard life-cycle models
-
-
Mead, N.1
Viswanathan, V.2
Padmanabhan, D.3
-
62
-
-
0038226150
-
-
Technical note, SEI-2001-TN-001. Software Engineering Institute, Carnegie Mellon University, Pittsburgh
-
Moore A, Ellison R, Linger R (2001) Attack modeling for information security and survivability. Technical note, SEI-2001-TN-001. Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
-
(2001)
Attack modeling for information security and survivability
-
-
Moore, A.1
Ellison, R.2
Linger, R.3
-
63
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
Mouratidis H, Giorgini P (2007) Secure tropos: a security-oriented extension of the tropos methodology. Int J Softw Eng Knowl Eng 17(2): 285-309.
-
(2007)
Int J Software Eng Knowl Eng
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
64
-
-
70450206834
-
Enhancing secure Tropos to effectively deal with security requirements in the development of multiagent systems
-
doi: 10. 1007/978-3-642-04879-1_2
-
Mouratidis H, Giorgini P (2009) Enhancing secure Tropos to effectively deal with security requirements in the development of multiagent systems. Safe Secur Multiagent Syst, Lecture Notes in Computer Science, vol 4324/2009, pp 8-26. doi: 10. 1007/978-3-642-04879-1_2.
-
(2009)
Safe Secur Multiagent Syst, Lecture Notes in Computer Science, vol 4324/2009
, pp. 8-26
-
-
Mouratidis, H.1
Giorgini, P.2
-
65
-
-
77954504239
-
From goal-driven security requirements engineering to secure design
-
Mouratidis H, Jurjens J (2010) From goal-driven security requirements engineering to secure design. Int J Intell Syst 25(8): 813-840.
-
(2010)
Int J Intell Syst
, vol.25
, Issue.8
, pp. 813-840
-
-
Mouratidis, H.1
Jurjens, J.2
-
68
-
-
84881614692
-
-
Network, telecom dictionary, encyclopedia-NetworkDictionary: Information, computer and network security terms glossary and dictionary-d-networkdictionary (2004-2011)
-
Network, telecom dictionary, encyclopedia-NetworkDictionary: Information, computer and network security terms glossary and dictionary-d-networkdictionary (2004-2011). http://www. networkdictionary. com/security/d. php.
-
-
-
-
70
-
-
33750129260
-
-
Special Report, CMU/SEI-2004-SR-015. Software Engineering Institute, Carnegie Mellon University, Pittsburgh
-
Ojoko-Adams D, Chen P, Dean M, Osman H, Lopez L, Xie N, Mead N (2004) System quality requirements engineering (SQUARE) methodology: case study on asset management system. Special Report, CMU/SEI-2004-SR-015. Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
-
(2004)
System quality requirements engineering (SQUARE) methodology: Case study on asset management system
-
-
Ojoko-Adams, D.1
Chen, P.2
Dean, M.3
Osman, H.4
Lopez, L.5
Xie, N.6
Mead, N.7
-
71
-
-
84992975038
-
Using case studies in research
-
Rowley J (2002) Using case studies in research. Manage Res News 25(1): 16-27.
-
(2002)
Management Research News
, vol.25
, Issue.1
, pp. 16-27
-
-
Rowley, J.1
-
74
-
-
82855173182
-
Security Measures for Advanced Metering Infrastructure Components
-
Chengdu, China doi: 10. 1109/APPEEC. 2010. 5448261
-
Shein R (2010) Security Measures for Advanced Metering Infrastructure Components. In: IEEE Asia-Pacific power and energy engineering conference (APPEEC), Chengdu, China, pp 1-3. doi: 10. 1109/APPEEC. 2010. 5448261.
-
(2010)
IEEE Asia-Pacific power and energy engineering conference (APPEEC)
, pp. 1-3
-
-
Shein, R.1
-
75
-
-
3142680761
-
Strategies for ensuring trustworthiness in qualitative research projects
-
Shenton A (2004) Strategies for ensuring trustworthiness in qualitative research projects. Educ inform 22(2): 63-76.
-
(2004)
Education for Information
, vol.22
, Issue.2
, pp. 63-76
-
-
Shenton, A.1
-
77
-
-
0032629380
-
Increase flexibility and security in prepayment, through the use of a separate consumer interface
-
Birmingham, UK doi: 10. 1049/cp: 19990145
-
Smart D (2002) Increase flexibility and security in prepayment, through the use of a separate consumer interface. In: 9th IET international conference on (Conf. Publ. No. 462) metering and tariffs for energy supply. Birmingham, UK, pp 242-247. doi: 10. 1049/cp: 19990145.
-
(2002)
9th IET international conference on (Conf. Publ. No. 462) metering and tariffs for energy supply
, pp. 242-247
-
-
Smart, D.1
-
78
-
-
84881617180
-
-
Software Engineering Institute CMU (2010) SQUARE
-
Software Engineering Institute CMU (2010) SQUARE. https://buildsecurityin. us-cert. gov/bsi/articles/best-practices/requirements/232-bsi. html.
-
-
-
-
79
-
-
84881612498
-
-
Software Engineering Institute CMU (2010) SQUARE
-
Software Engineering Institute CMU (2010) SQUARE. http://www. cert. org/sse/square/square-faq. html.
-
-
-
-
80
-
-
84881610949
-
-
Software Engineering Institute CMU
-
Software Engineering Institute CMU (2011) http://www. sei. cmu. edu/.
-
(2011)
-
-
-
83
-
-
85008056120
-
An AMI system for the deregulated electricity markets
-
Sui H, Wang H, Lu M, Lee W (2009) An AMI system for the deregulated electricity markets. IEEE Trans Indus Appl 45(6): 2104-2108.
-
(2009)
IEEE Trans Ind Appl
, vol.45
, Issue.6
, pp. 2104-2108
-
-
Sui, H.1
Wang, H.2
Lu, M.3
Lee, W.4
-
84
-
-
0032290141
-
Supporting scenario-based requirements engineering
-
Sutcliffe A, Maiden N, Minocha S, Manuel D (1998) Supporting scenario-based requirements engineering. IEEE Trans Softw Eng 24(12): 1072-1088.
-
(1998)
IEEE Trans Software Eng
, vol.24
, Issue.12
, pp. 1072-1088
-
-
Sutcliffe, A.1
Maiden, N.2
Minocha, S.3
Manuel, D.4
-
85
-
-
40949132948
-
Cybersecurity for electric power control and automation systems
-
Montreal, Quebec doi: 10. 1109/ICSMC. 2007. 4414239
-
Ten C, Govindarasu M, Liu C (2007) Cybersecurity for electric power control and automation systems. In: IEEE international conference on systems, man and cybernetics ISIC. Montreal, Quebec, pp 29-34. doi: 10. 1109/ICSMC. 2007. 4414239.
-
(2007)
IEEE international conference on systems, man and cybernetics ISIC
, pp. 29-34
-
-
Ten, C.1
Govindarasu, M.2
Liu, C.3
-
86
-
-
42549101645
-
Vulnerability assessment of cybersecurity for SCADA systems using attack trees
-
Tampa, Florida doi: 10. 1109/PES. 2007. 385876
-
Ten CW, Liu CC, Govindarasu M (2007) Vulnerability assessment of cybersecurity for SCADA systems using attack trees. In: IEEE power engineering society general meeting. Tampa, Florida, pp 1-8. doi: 10. 1109/PES. 2007. 385876.
-
(2007)
IEEE power engineering society general meeting
, pp. 1-8
-
-
Ten, C.W.1
Liu, C.C.2
Govindarasu, M.3
-
87
-
-
77953695984
-
Cybersecurity for critical infrastructures: attack and defense modeling
-
Ten C, Manimaran G, Liu C (2010) Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans Syst Man Cybernet Part A Syst Humans 40(4): 853-865.
-
(2010)
IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans
, vol.40
, Issue.4
, pp. 853-865
-
-
Ten, C.1
Manimaran, G.2
Liu, C.3
-
89
-
-
77949458749
-
Research on security requirements engineering process
-
IEEM '09. Beijing, China doi: 10. 1109/ICIEEM. 2009. 5344450
-
Wang H, Jia Z, Shen Z (2009) Research on security requirements engineering process. In: 16th International conference on industrial engineering and engineering management, IEEM '09. Beijing, China, pp 1285-1288. doi: 10. 1109/ICIEEM. 2009. 5344450.
-
(2009)
16th International conference on industrial engineering and engineering management
, pp. 1285-1288
-
-
Wang, H.1
Jia, Z.2
Shen, Z.3
-
90
-
-
26244452473
-
Security and vulnerability in electric power systems
-
University of Missouri Rolla in Rolla, Missouri, USA
-
Watts D (2003) Security and vulnerability in electric power systems. In: 35th North American power symposium (NAPS '03). University of Missouri Rolla in Rolla, Missouri, USA, pp 559-566.
-
(2003)
35th North American power symposium (NAPS '03)
, pp. 559-566
-
-
Watts, D.1
-
91
-
-
77952113745
-
An integrated security system of protecting Smart Grid against cyber attacks
-
Gaithersburg, MD doi: 10. 1109/ISGT. 2010. 5434767
-
Wei D, Lu Y, Jafari M, Skare P, Rohde K (2010) An integrated security system of protecting Smart Grid against cyber attacks. In: IEEE innovative smart grid technologies (ISGT). Gaithersburg, MD, pp 1-7. doi: 10. 1109/ISGT. 2010. 5434767.
-
(2010)
IEEE innovative smart grid technologies (ISGT)
, pp. 1-7
-
-
Wei, D.1
Lu, Y.2
Jafari, M.3
Skare, P.4
Rohde, K.5
-
93
-
-
26444542152
-
Supporting distributed collaborative prioritization for winwin requirements capture and negotiations
-
Orlando, FL
-
won Park J, Port D, Boehm B (1999) Supporting distributed collaborative prioritization for winwin requirements capture and negotiations. In: 3rd International world multiconference on systemics, cybernetics and informatics (SCI '99), IIIS, vol 2. Orlando, FL, pp 578-584.
-
(1999)
3rd International world multiconference on systemics, cybernetics and informatics (SCI '99), IIIS
, vol.2
, pp. 578-584
-
-
won Park, J.1
Port, D.2
Boehm, B.3
|