Amanote Research
Register
Sign In
Holistic Security Requirements Analysis: An Attacker's Perspective
doi 10.1109/re.2015.7320439
Full Text
Open PDF
Abstract
Available in
full text
Date
August 1, 2015
Authors
Tong Li
Elda Paja
John Mylopoulos
Jennifer Horkoff
Kristian Beckers
Publisher
IEEE
Related search
Strengthening Data Security: An Holistic Approach
IASSIST Quarterly
An Holistic View of Information Security: A Proposed Framework
International Journal for Infonomics
Secure Information Assets With Data: An Information Security Governance Framework Using Orchestrated Data Analytics From a Holistic Perspective
Facilitators and Barriers to Holistic Practice, an Osteopathic Perspective
Analysis of Security Requirements of Futuristic Mobile Applications
International Journal of Information Sciences and Techniques
Designing an Educational Game: Design Principles From a Holistic Perspective
International Journal of Learning
Education
Holistic Perspective of Standardization Strategies
International Journal of Applied Management Sciences and Engineering
GBAS Ground Monitoring Requirements From an Airworthiness Perspective
GPS Solutions
Earth
Planetary Sciences
Holistic Customer Requirements and the Design-Select Decision
Management Science
Management Science
Management
Operations Research
Strategy