{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T05:05:37Z","timestamp":1739509537532,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642048395"},{"type":"electronic","value":"9783642048401"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04840-1_9","type":"book-chapter","created":{"date-parts":[[2009,11,9]],"date-time":"2009-11-09T15:09:31Z","timestamp":1257779371000},"page":"84-98","source":"Crossref","is-referenced-by-count":1,"title":["Monitoring and Diagnosing Malicious Attacks with Autonomic Software"],"prefix":"10.1007","author":[{"given":"V\u00edtor E. Silva","family":"Souza","sequence":"first","affiliation":[]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10515-008-0042-8","volume":"16","author":"Y. Wang","year":"2009","unstructured":"Wang, Y., McIlraith, S.A., Yu, Y., Mylopoulos, J.: Monitoring and diagnosing software requirements. Automated Software Engineering\u00a016, 3\u201335 (2009)","journal-title":"Automated Software Engineering"},{"doi-asserted-by":"crossref","unstructured":"Fickas, S., Feather, M.: Requirements monitoring in dynamic environments. In: Proceedings of the Second IEEE International Symposium on Requirements Engineering, vol.\u00a01995, pp. 140\u2013147 (1995)","key":"9_CR2","DOI":"10.1109\/ISRE.1995.512555"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/3-540-45816-6_22","volume-title":"Conceptual Modeling - ER 2002","author":"P. Giorgini","year":"2002","unstructured":"Giorgini, P., Mylopoulos, J., Nicchiarelli, E., Sebastiani, R.: Reasoning with goal models. In: Spaccapietra, S., March, S.T., Kambayashi, Y. (eds.) ER 2002. LNCS, vol.\u00a02503, pp. 167\u2013181. Springer, Heidelberg (2002)"},{"unstructured":"van Lamsweerde, A., Brohez, S., De Landtsheer, R., Janssens, D.: From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering. In: Workshop on Requirements for High Assurance Systems (RHAS 2003), pre-workshop of the 11th International IEEE Conference on Requirements Engineering, Software Engineering Institute Report, September 2003, pp. 49\u201356 (2003)","key":"9_CR4"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-642-04840-1_11","volume-title":"ER 2009","author":"A. Lapouchnian","year":"2009","unstructured":"Lapouchnian, A., Mylopoulos, J.: Modeling domain variability in requirements engineering with contexts. In: Laender, A.H.F., et al. (eds.) ER 2009. LNCS, vol.\u00a05829, pp. 115\u2013130. Springer, Heidelberg (2009)"},{"unstructured":"Castello, R.: Squirrelmail (2009), http:\/\/www.squirrelmail.org","key":"9_CR6"},{"unstructured":"Yu, Y., Wang, Y., Mylopoulos, J., Liaskos, S., Lapouchnian, A., do Prado Leite, J.: Reverse engineering goal models from legacy code. In: Proceedings of the 13th IEEE International Conference on Requirements Engineering, 2005, August -2 September 2005, pp. 363\u2013372 (2005)","key":"9_CR7"},{"key":"9_CR8","first-page":"401","volume":"29","author":"A. Susi","year":"2005","unstructured":"Susi, A., Perini, A., Mylopoulos, J., Giorgini, P.: The tropos metamodel and its use. Informatica\u00a029, 401\u2013408 (2005)","journal-title":"Informatica"},{"unstructured":"Bjork, R.C.: Atm simulation (2009), http:\/\/www.cs.gordon.edu\/courses\/cs211\/ATMExample\/","key":"9_CR9"},{"key":"9_CR10","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1109\/HICSS.2005.306","volume-title":"HICSS 2005: Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Track 7","author":"W..N. Robinson","year":"2005","unstructured":"Robinson, W.N.: Implementing rule-based monitors within a framework for continuous requirements monitoring. In: HICSS 2005: Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Track 7, p. 188a. IEEE Computer Society, Los Alamitos (2005)"},{"key":"9_CR11","first-page":"289","volume-title":"ASE 2006: Proceedings of the 21st IEEE\/ACM International Conference on Automated Software Engineering","author":"K. Winbladh","year":"2006","unstructured":"Winbladh, K., Alspaugh, T.A., Ziv, H., Richardson, D.J.: An automated approach for goal-driven, specification-based testing. In: ASE 2006: Proceedings of the 21st IEEE\/ACM International Conference on Automated Software Engineering, Washington, DC, USA, pp. 289\u2013292. IEEE Computer Society, Los Alamitos (2006)"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1137627.1137634","volume-title":"SESS 2006: Proceedings of the 2006 international workshop on Software engineering for secure systems","author":"C.B. Haley","year":"2006","unstructured":"Haley, C.B., Moffett, J.D., Laney, R., Nuseibeh, B.: A framework for security requirements engineering. In: SESS 2006: Proceedings of the 2006 international workshop on Software engineering for secure systems, pp. 35\u201342. ACM, New York (2006)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-540-75563-0_26","volume-title":"Conceptual Modeling - ER 2007","author":"G. Elahi","year":"2007","unstructured":"Elahi, G., Yu, E.: A goal oriented approach for modeling and analyzing security trade-offs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol.\u00a04801, pp. 375\u2013390. Springer, Heidelberg (2007)"},{"unstructured":"Sindre, G., Opdahl, A.L.: Reqsec - requirements for secure information systems, project proposal for fritek (2007), http:\/\/www.idi.ntnu.no\/~guttors\/reqsec\/plan.pdf","key":"9_CR14"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-540-76292-8_13","volume-title":"Advances in Conceptual Modeling \u2013 Foundations and Applications","author":"A. Rodr\u00edguez","year":"2007","unstructured":"Rodr\u00edguez, A., Fern\u00e1ndez-Medina, E., Piattini, M.: M-bPSec: A method for security requirement elicitation from a UML 2.0 business process specification. In: Hainaut, J.-L., Rundensteiner, E.A., Kirchberg, M., Bertolotto, M., Brochhausen, M., Chen, Y.-P.P., Cherfi, S.S.-S., Doerr, M., Han, H., Hartmann, S., Parsons, J., Poels, G., Rolland, C., Trujillo, J., Yu, E., Zim\u00e1nyie, E. (eds.) ER Workshops 2007. LNCS, vol.\u00a04802, pp. 106\u2013115. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Mellado, D., Fernandez-Medina, E., Piattini, M.: Security requirements variability for software product lines, pp. 1413\u20131420 (March 2008)","key":"9_CR16","DOI":"10.1109\/ARES.2008.165"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/RE.2005.43","volume-title":"RE 2005: Proceedings of the 13th IEEE International Conference on Requirements Engineering","author":"P. Giorgini","year":"2005","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling security requirements through ownership, permission and delegation. In: RE 2005: Proceedings of the 13th IEEE International Conference on Requirements Engineering, Washington, DC, USA, pp. 167\u2013176. IEEE Computer Society, Los Alamitos (2005)"},{"key":"9_CR18","first-page":"1","volume-title":"PST 2006: Proceedings of the 2006 International Conference on Privacy, Security and Trust","author":"M. Graves","year":"2006","unstructured":"Graves, M., Zulkernine, M.: Bridging the gap: software specification meets intrusion detector. In: PST 2006: Proceedings of the 2006 International Conference on Privacy, Security and Trust, pp. 1\u20138. ACM, New York (2006)"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1145\/1089551.1089658","volume-title":"ICEC 2005: Proceedings of the 7th international conference on Electronic commerce","author":"D. Hong","year":"2005","unstructured":"Hong, D., Chiu, D.K.W., Shen, V.Y.: Requirements elicitation for the design of context-aware applications in a ubiquitous environment. In:ICEC 2005: Proceedings of the 7th international conference on Electronic commerce, pp. 590\u2013596. ACM, New York (2005)"},{"unstructured":"Salifu, M., Nuseibeh, B., Rapanotti, L., Tun, T.T.: Using problem descriptions to represent variability for context-aware applications. In: First International Workshop on Variability Modelling of Software-intensive Systems (2007)","key":"9_CR20"},{"unstructured":"Semmak, F., Gnaho, C., Laleau, R.: Extended kaos to support variability for goal oriented requirements reuse. In: Proceedings of the International Workshop on Model Driven Information Systems Engineering: Enterprise, User and System Models (MoDISE-EUS 2008, in conjunction with CAiSE), pp. 22\u201333 (2008)","key":"9_CR21"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-540-87877-3_14","volume-title":"Conceptual Modeling - ER 2008","author":"R. Ali","year":"2008","unstructured":"Ali, R., Dalpiaz, F., Giorgini, P.: Location-based software modeling and analysis: Tropos-based approach. In: Li, Q., Spaccapietra, S., Yu, E., Oliv\u00e9, A. (eds.) ER 2008. LNCS, vol.\u00a05231, pp. 169\u2013182. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling - ER 2009"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04840-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T04:19:22Z","timestamp":1739420362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04840-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642048395","9783642048401"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04840-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}