Security Requirements Prioritization Based on Threat Modeling and Valuation Graph

Keunyoung Park, Sang Guun Yoo, Juho Kim. Security Requirements Prioritization Based on Threat Modeling and Valuation Graph. In Geuk Lee, Daniel Howard, Dominik Slezak, editors, Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings. Volume 206 of Communications in Computer and Information Science, pages 142-152, Springer, 2011. [doi]

@inproceedings{ParkYK11-0,
  title = {Security Requirements Prioritization Based on Threat Modeling and Valuation Graph},
  author = {Keunyoung Park and Sang Guun Yoo and Juho Kim},
  year = {2011},
  doi = {10.1007/978-3-642-24106-2_19},
  url = {http://dx.doi.org/10.1007/978-3-642-24106-2_19},
  researchr = {https://researchr.org/publication/ParkYK11-0},
  cites = {0},
  citedby = {0},
  pages = {142-152},
  booktitle = {Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings},
  editor = {Geuk Lee and Daniel Howard and Dominik Slezak},
  volume = {206},
  series = {Communications in Computer and Information Science},
  publisher = {Springer},
  isbn = {978-3-642-24105-5},
}