{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:47:15Z","timestamp":1776782835742,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642167812","type":"print"},{"value":"9783642167829","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16782-9_1","type":"book-chapter","created":{"date-parts":[[2010,11,3]],"date-time":"2010-11-03T05:26:19Z","timestamp":1288761979000},"page":"1-15","source":"Crossref","is-referenced-by-count":21,"title":["Comparing Two Techniques for Intrusion Visualization"],"prefix":"10.1007","author":[{"given":"Vikash","family":"Katta","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Karpati","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andreas L.","family":"Opdahl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian","family":"Raspotnig","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guttorm","family":"Sindre","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"Proceedings of the Sixth International Enterprise Distributed Object Computing Conference (EDOC 2002)","author":"J.\u00d8. Aagedal","year":"2002","unstructured":"Aagedal, J.\u00d8., et al.: Model-based Risk Assessment to Improve Enterprise Security. In: Proceedings of the Sixth International Enterprise Distributed Object Computing Conference (EDOC 2002). IEEE, Los Alamitos (2002)"},{"key":"1_CR2","volume-title":"The Art of Intrusion","author":"K.D. Mitnick","year":"2006","unstructured":"Mitnick, K.D., Simon, W.L.: The Art of Intrusion. Wiley Publishing Inc., Chichester (2006)"},{"key":"1_CR3","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"B. Schneier","year":"2000","unstructured":"Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley, Chichester (2000)"},{"issue":"1","key":"1_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering\u00a010(1), 34\u201344 (2005)","journal-title":"Requirements Engineering"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Karpati, P., Sindre, G., Opdahl, A.L.: Illustrating Cyber Attacks with Misuse Case Maps. Accepted to 16th International Working Conference on Requirements Engineering: Foundation for Software Quality, RefsQ 2010 (2010)","DOI":"10.1007\/978-3-642-14192-8_24"},{"key":"1_CR6","unstructured":"Karpati, P., Opdahl, A.L., Sindre, G.: Experimental evaluation of misuse case maps for eliciting security requirements. Submitted to 18th IEEE International Conference on Requirements Engineering, RE 2010 (2010)"},{"key":"1_CR7","unstructured":"Unified Modeling Language, http:\/\/www.uml.org (accessed 4.6.2010)"},{"key":"1_CR8","unstructured":"Internet Security Glossary, http:\/\/www.apps.ietf.org\/rfc\/rfc2828.html (accessed 22.6.2010)"},{"issue":"5","key":"1_CR9","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1016\/j.infsof.2008.05.013","volume":"51","author":"A.L. Opdahl","year":"2009","unstructured":"Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology\u00a051(5), 916\u2013932 (2009)","journal-title":"Information and Software Technology"},{"key":"1_CR10","unstructured":"Buhr, R.J.A.: Use Case Maps: A New Model to Bridge the Gap Between Requirements and Detailed Design. In: 11th Annual ACM Conference on Object-Oriented Programming Systems, Languages and Applications (OOPSLA 1995), Real Time Workshop, p. 4 (1995)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Markose, S., Xiaoqing, L., McMillin, B.: A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems. In: IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing, vol.\u00a01, pp. 75\u201381 (2008)","DOI":"10.1109\/EUC.2008.92"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.infsof.2008.05.004","volume":"51","author":"G. Georg","year":"2009","unstructured":"Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., Houmb, S.H.: An aspect-oriented methodology for designing secure applications. Information and Software Technology\u00a051, 846\u2013864 (2009)","journal-title":"Information and Software Technology"},{"key":"1_CR13","volume-title":"Hazop and software Hazop","author":"F. Redmill","year":"1999","unstructured":"Redmill, F., Chudleigh, M., Catmur, J.: Hazop and software Hazop. Wiley, Chichester (1999)"},{"key":"1_CR14","unstructured":"IEC 61025: Fault tree analysis (FTA), IEC Standard (2006)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Runde, R.K., Haugen, \u00d8., St\u00f8len, K.: The Pragmatics of STAIRS, Research Report 349 (January 2007)","DOI":"10.1007\/11804192_5"},{"key":"1_CR16","volume-title":"Secure Systems Development with UML","author":"J. J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)"},{"key":"1_CR17","unstructured":"Karpati, P.: http:\/\/www.idi.ntnu.no\/~kpeter\/ExampleSheet_Group1.pdf (accessed 24.6.2010)"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly\u00a013, 319\u2013340 (1989)","journal-title":"MIS Quarterly"},{"key":"1_CR19","volume-title":"Statistical power analysis for the behavioral sciences","author":"J. Cohen","year":"1988","unstructured":"Cohen, J.: Statistical power analysis for the behavioral sciences, 2nd edn. Lawrence Erlbaum, New Jersey (1988)","edition":"2"},{"key":"1_CR20","volume-title":"A New View of Statistics","author":"W.G. Hopkins","year":"2001","unstructured":"Hopkins, W.G.: A New View of Statistics. University of Queensland, Brisbane (2001)"},{"key":"1_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in Software Engineering: An Introduction","author":"C. Wohlin","year":"2000","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering: An Introduction. Kluwer Academic, Norwell (2000)"},{"key":"1_CR22","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1109\/TSE.2004.43","volume":"30","author":"E. Arisholm","year":"2004","unstructured":"Arisholm, E., Sj\u00f8berg, D.I.K.: Evaluating the effect of a delegated versus centralized control style on the maintainability of object-oriented software. IEEE Transactions on Software Engineering\u00a030, 521\u2013534 (2004)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"1_CR23","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V. Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: Toward a unified view. MIS Quarterly\u00a027(3), 425\u2013478 (2003)","journal-title":"MIS Quarterly"}],"container-title":["Lecture Notes in Business Information Processing","The Practice of Enterprise Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16782-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T22:00:47Z","timestamp":1559772047000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16782-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642167812","9783642167829"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16782-9_1","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}