Threat analysis of software systems: A systematic literature review

K Tuma, G Calikli, R Scandariato - Journal of Systems and Software, 2018 - Elsevier
Architectural threat analysis has become an important cornerstone for organizations
concerned with developing secure software. Due to the large number of existing techniques …

Security and privacy for innovative automotive applications: A survey

J den Hartog, N Zannone - Computer Communications, 2018 - Elsevier
Software applications play an important role in vehicle innovation, aiming at improved
safety, efficiency, and comfort, and creating the new areas of cooperative intelligent transport …

Strategic business modeling: representation and reasoning

J Horkoff, D Barone, L Jiang, E Yu, D Amyot… - Software & Systems …, 2014 - Springer
Business intelligence (BI) offers tremendous potential for business organizations to gain
insights into their day-to-day operations, as well as longer term opportunities and threats …

A systematic approach to define the domain of information system security risk management

É Dubois, P Heymans, N Mayer… - … on information systems …, 2010 - Springer
Today, security concerns are at the heart of information systems, both at technological and
organizational levels. With over 200 practitioner-oriented risk management methods and …

Route skyline queries: A multi-preference path planning approach

HP Kriegel, M Renz, M Schubert - 2010 IEEE 26th International …, 2010 - ieeexplore.ieee.org
In recent years, the research community introduced various methods for processing skyline
queries in multidimensional databases. The skyline operator retrieves all objects being …

The devil is in the tails: How long-tailed code distributions impact large language models

X Zhou, K Kim, B Xu, J Liu, DG Han, D Lo - arXiv preprint arXiv …, 2023 - arxiv.org
Learning-based techniques, especially advanced Large Language Models (LLMs) for code,
have gained considerable popularity in various software engineering (SE) tasks. However …

A systematic literature review of istar extensions

E Gonçalves, J Castro, J Araújo, T Heineck - Journal of Systems and …, 2018 - Elsevier
Abstract iStar is a general-purpose goal-based modelling language used to model
requirements at early and late phases of software development. It has been used in …

Requirements-driven adaptive security: Protecting variable assets at runtime

M Salehie, L Pasquale, I Omoronyia… - 2012 20th IEEE …, 2012 - ieeexplore.ieee.org
Security is primarily concerned with protecting assets from harm. Identifying and evaluating
assets are therefore key activities in any security engineering process-from modeling threats …

Towards an ontology for privacy requirements via a systematic literature review

M Gharib, P Giorgini, J Mylopoulos - Conceptual Modeling: 36th …, 2017 - Springer
Privacy has been frequently identified as a main concern for systems that deal with personal
information. However, much of existing work on privacy requirements deals with them as a …

Conceptual integration of enterprise architecture management and security risk management

E Grandry, C Feltus, E Dubois - 2013 17th IEEE International …, 2013 - ieeexplore.ieee.org
Enterprise Architecture Management (EAM) is considered to provide the mechanism for,
amongst others, governing enterprise transformations required by changes in the …