Information technology. Security techniques. Systems security engineering. Capability maturity model (SSE- CMM) ,
Information technology. Security techniques. Information security management systems. Overview and vocabulary ,
, Guide for conducting risk assessments, 2012.
Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp.490-497, 2018. ,
Managing Information Security Risks: The Octave Approach, 2002. ,
The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling, Communications in Computer and Information Science, pp.109-124, 2019. ,
Software Architectural Design Meets Security Engineering, 2009 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp.109-118, 2009. ,
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach, Journal of Systems and Software, vol.163, p.110537, 2020. ,
Seven Deadliest Microsoft Attacks, 2010. ,
Architectural Approaches to Security: Four Case Studies, Computer, vol.49, issue.11, pp.60-67, 2016. ,
Dimensional Analysis Conceptual Modeling Supporting Adaptable Reasoning in simulation-based training, 2018 13th Annual Conference on System of Systems Engineering (SoSE), pp.245-252, 2018. ,
Gate, a general architecture for text engineering, Computers and the Humanities, vol.36, issue.2, pp.223-254, 2002. ,
Exiting the Risk Assessment Maze, ACM Computing Surveys, vol.51, issue.1, pp.1-30, 2018. ,
A System-Aware Cyber Security architecture, Systems Engineering, vol.15, issue.2, pp.225-240, 2012. ,
UMLsec: Extending UML for Secure Systems Development, ?UML? 2002 ? The Unified Modeling Language, pp.412-425, 2002. ,
Effective Analysis of Attack Trees: A Model-Driven Approach, Fundamental Approaches to Software Engineering, pp.56-73, 2018. ,
Security basics for computer architects, Synthesis Lectures on Computer Architecture, vol.8, issue.4, pp.1-111, 2013. ,
SecureUML: A UML-Based Modeling Language for Model-Driven Security, ?UML? 2002 ? The Unified Modeling Language, pp.426-441, 2002. ,
Foundations of Attack Trees, Information Security and Cryptology - ICISC 2005, pp.186-198, 2006. ,
The common vulnerability scoring system (CVSS) and its applicability to federal agency systems, 2007. ,
A common criteria based security requirements engineering process for the development of secure information systems, Computer Standards & Interfaces, vol.29, issue.2, pp.244-253, 2007. ,
Common weakness enumeration (CWE) status update, ACM SIGAda Ada Letters, vol.XXVIII, issue.1, pp.88-91, 2008. ,
Attack Modeling for Information Security and Survivability, 2001. ,
Common platform enumeration :, 2011. ,
Petri Nets, ACM Computing Surveys, vol.9, issue.3, pp.223-252, 1977. ,
Petya ransomware: Here's what you need to know ,
Threat Modeling: Designing for Security, 2014. ,
Computer Security: Principles and Practice, 2014. ,
, , 2019.
Inspection guidelines to identify security design flaws, Proceedings of the 13th European Conference on Software Architecture - ECSA '19 - volume 2, vol.2, p.19, 2019. ,
Asset-centric Security-Aware Service Selection, 2016 IEEE International Congress on Big Data (BigData Congress), pp.327-332, 2016. ,
Design notations for secure software: A systematic literature review, Softw. Syst. Model, vol.16, issue.3, pp.809-831, 2017. ,
Software engineering -principles and practice, 2007. ,