{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:47:15Z","timestamp":1776782835737,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642176494","type":"print"},{"value":"9783642176500","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_25","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T15:22:11Z","timestamp":1291648931000},"page":"355-366","source":"Crossref","is-referenced-by-count":4,"title":["Experimental Threat Model Reuse with Misuse Case Diagrams"],"prefix":"10.1007","author":[{"given":"Jostein","family":"Jensen","sequence":"first","affiliation":[]},{"given":"Inger Anne","family":"T\u00f8ndel","sequence":"additional","affiliation":[]},{"given":"Per H\u00e5kon","family":"Meland","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Alexander, I.: Initial industrial experience of misuse cases in trade-off analysis. In: Proceedings of IEEE Joint International Conference on Requirements Engineering, pp. 61\u201368 (2002)","DOI":"10.1109\/ICRE.2002.1048506"},{"issue":"1","key":"25_CR2","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s10664-009-9109-9","volume":"15","author":"J.C. Carver","year":"2010","unstructured":"Carver, J.C., Jaccheri, L., Morasca, S., Shull, F.: A checklist for integrating student empirical studies with research and teaching goals. Empirical Softw. Engg.\u00a015(1), 35\u201359 (2010)","journal-title":"Empirical Softw. Engg."},{"issue":"3","key":"25_CR3","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F. Davis","year":"1989","unstructured":"Davis, F.: Perceived usefulness, perceived ease of use, and user acceptance of information technologies. MIS Quarterly\u00a013(3), 319\u2013340 (1989)","journal-title":"MIS Quarterly"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.5381\/jot.2004.3.1.c6","volume":"3","author":"D. Firesmith","year":"2004","unstructured":"Firesmith, D.: Specifying reusable security requirements. Journal of Object Technology\u00a03, 61\u201375 (2004)","journal-title":"Journal of Object Technology"},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MC.2010.159","volume":"43","author":"D. Geer","year":"2010","unstructured":"Geer, D.: Are companies actually using secure development life cycles? Computer\u00a043, 12\u201316 (2010)","journal-title":"Computer"},{"issue":"3","key":"25_CR6","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1023\/A:1026586415054","volume":"5","author":"M. H\u00f6st","year":"2000","unstructured":"H\u00f6st, M., Regnell, B., Wohlin, C.: Using students as subjects - a comparative study of students and professionals in lead-time impact assessment. Empirical Softw. Engg.\u00a05(3), 201\u2013214 (2000)","journal-title":"Empirical Softw. Engg."},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: Proceedings of 15th Annual Computer Security Applications Conference, ACSAC 1999, pp. 55\u201364 (1999)","DOI":"10.1109\/CSAC.1999.816013"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-11747-3_9","volume-title":"Engineering Secure Software and Systems","author":"P.H. Meland","year":"2010","unstructured":"Meland, P.H., T\u00f8ndel, I.A., Jensen, J.: Idea: Reusability of threat models - two approaches with an experimental evaluation. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol.\u00a05965, pp. 114\u2013122. Springer, Heidelberg (2010)"},{"issue":"5","key":"25_CR9","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1016\/j.infsof.2008.05.013","volume":"51","author":"A.L. Opdahl","year":"2009","unstructured":"Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology\u00a051(5), 916\u2013932 (2009)","journal-title":"Information and Software Technology"},{"key":"25_CR10","unstructured":"Schneier, B.: Attack trees. Dr. Dobb\u2019s Journal (1999)"},{"issue":"1","key":"25_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering\u00a010(1), 33\u201344 (2005)","journal-title":"Requirements Engineering"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Sindre, G., Opdahl, A.: Eliciting security requirements by misuse cases. In: Proceedings of 37th International Conference on Technology of Object-Oriented Languages and Systems, TOOLS-Pacific 2000, pp. 120\u2013131 (2000)","DOI":"10.1109\/TOOLS.2000.891363"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T13:52:42Z","timestamp":1740750762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}