A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities.
Golnaz ElahiEric S. K. YuNicola ZannonePublished in: Requir. Eng. (2010)
Keyphrases
- countermeasures
- information security
- requirements engineering
- security measures
- security requirements
- java card
- cyber attacks
- security risks
- security breaches
- security vulnerabilities
- security issues
- computer security
- requirements elicitation
- information systems
- intrusion detection
- requirements engineering process
- network security
- life cycle
- smart card
- security mechanisms
- buffer overflow
- security problems
- software engineering
- database
- data mining
- goal oriented
- security properties
- software development process
- power analysis
- case study
- real world
- attack graphs
- requirements specification
- machine learning
- security patterns
- software development
- computer systems
- critical infrastructure
- functional requirements
- smart grid