Keunyoung Park, Sang Guun Yoo, Juho Kim. Security Requirements Prioritization Based on Threat Modeling and Valuation Graph. In Geuk Lee, Daniel Howard, Dominik Slezak, editors, Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings. Volume 206 of Communications in Computer and Information Science, pages 142-152, Springer, 2011. [doi]
@inproceedings{ParkYK11-0, title = {Security Requirements Prioritization Based on Threat Modeling and Valuation Graph}, author = {Keunyoung Park and Sang Guun Yoo and Juho Kim}, year = {2011}, doi = {10.1007/978-3-642-24106-2_19}, url = {http://dx.doi.org/10.1007/978-3-642-24106-2_19}, researchr = {https://researchr.org/publication/ParkYK11-0}, cites = {0}, citedby = {0}, pages = {142-152}, booktitle = {Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings}, editor = {Geuk Lee and Daniel Howard and Dominik Slezak}, volume = {206}, series = {Communications in Computer and Information Science}, publisher = {Springer}, isbn = {978-3-642-24105-5}, }