Security Requirements Prioritization Based on Threat Modeling and Valuation Graph

Keunyoung Park, Sang Guun Yoo, Juho Kim. Security Requirements Prioritization Based on Threat Modeling and Valuation Graph. In Geuk Lee, Daniel Howard, Dominik Slezak, editors, Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings. Volume 206 of Communications in Computer and Information Science, pages 142-152, Springer, 2011. [doi]

Authors

Keunyoung Park

This author has not been identified. Look up 'Keunyoung Park' in Google

Sang Guun Yoo

This author has not been identified. Look up 'Sang Guun Yoo' in Google

Juho Kim

This author has not been identified. Look up 'Juho Kim' in Google