Amanote Research

Amanote Research

    RegisterSign In

Holistic Security Requirements Analysis: An Attacker's Perspective

doi 10.1109/re.2015.7320439
Full Text
Open PDF
Abstract

Available in full text

Date

August 1, 2015

Authors
Tong LiElda PajaJohn MylopoulosJennifer HorkoffKristian Beckers
Publisher

IEEE


Related search

Strengthening Data Security: An Holistic Approach

IASSIST Quarterly
2010English

An Holistic View of Information Security: A Proposed Framework

International Journal for Infonomics
2011English

Secure Information Assets With Data: An Information Security Governance Framework Using Orchestrated Data Analytics From a Holistic Perspective

2016English

Facilitators and Barriers to Holistic Practice, an Osteopathic Perspective

2018English

Analysis of Security Requirements of Futuristic Mobile Applications

International Journal of Information Sciences and Techniques
2016English

Designing an Educational Game: Design Principles From a Holistic Perspective

International Journal of Learning
Education
2011English

Holistic Perspective of Standardization Strategies

International Journal of Applied Management Sciences and Engineering
2015English

GBAS Ground Monitoring Requirements From an Airworthiness Perspective

GPS Solutions
EarthPlanetary Sciences
2014English

Holistic Customer Requirements and the Design-Select Decision

Management Science
Management ScienceManagementOperations ResearchStrategy
1999English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy