Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security Requirements.
Giovanna BrocciaMaurice H. ter BeekAlberto Lluch-LafuentePaola SpoletiniAlessio FerrariPublished in: REFSQ (2024)
Keyphrases
- security requirements
- security analysis
- defense mechanisms
- information security
- countermeasures
- smart card
- network security
- security policies
- security problems
- ddos attacks
- security concerns
- security model
- security properties
- access control
- authentication protocol
- intrusion detection
- security mechanisms
- software architecture
- reference models
- security patterns
- secret key
- cyber attacks
- encryption algorithm
- requirements engineering
- mobile commerce
- secure electronic
- covert channel
- security protocols
- sensor networks
- software engineering
- development lifecycle
- cloud computing
- network traffic