{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:08:06Z","timestamp":1761808086623,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/rcis.2016.7549303","type":"proceedings-article","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T21:04:18Z","timestamp":1472159058000},"page":"1-13","source":"Crossref","is-referenced-by-count":20,"title":["Security attack analysis using attack patterns"],"prefix":"10.1109","author":[{"given":"Tong","family":"Li","sequence":"first","affiliation":[]},{"given":"Elda","family":"Paja","sequence":"additional","affiliation":[]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]},{"given":"Jennifer","family":"Horkoff","sequence":"additional","affiliation":[]},{"given":"Kristian","family":"Beckers","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Linking patterns and non-functional requirements","author":"araujo","year":"2002","journal-title":"Proceedings of the Ninth Conference on Pattern Language of Programs (PLOP 2002)"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/978-3-319-05149-9"},{"year":"2013","author":"fernandez-buglioni","journal-title":"Security Patterns in Practice Designing Secure Architectures Using Software Patterns","key":"ref31"},{"key":"ref30","volume":"5","author":"buschmann","year":"2007","journal-title":"Pattern-Oriented Software Architecture On Patterns and Pattern Languages"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-319-07869-4_32"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-662-45501-2_15"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/CEC.2011.13"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/s00766-010-0110-z"},{"key":"ref14","volume":"2","author":"alexander","year":"1977","journal-title":"A Pattern Language Towns Buildings Construction"},{"key":"ref15","first-page":"185","article-title":"A prototype tool for modeling and analyzing security requirements from a holistic viewpoint","author":"li","year":"2014","journal-title":"The CAiSE'14 Forum at the 26th International Conference on Advanced Information Systems Engineering"},{"key":"ref16","article-title":"A smart metering scenario","author":"cuellar","year":"2013","journal-title":"Network of Excellence on Engineering Secure Future Internet Software Services and Systems eRISE"},{"key":"ref17","article-title":"Roadmap for smart grid interoperability standards, release 2.0","volume":"1108r2","author":"framework","year":"2012","journal-title":"NIST Special Publication"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s00766-012-0153-4"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/s10664-008-9102-8"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/1082983.1083211"},{"key":"ref4","first-page":"49","article-title":"A holistic approach to security attack modeling and analysis","author":"li","year":"2015","journal-title":"Proceedings of the Eight International Workshop"},{"key":"ref27","article-title":"Attack modeling for information security and survivability","author":"moore","year":"2001","journal-title":"CMU-SEI-2001-TN-001 Tech Rep"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/RE.2015.7320439"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/978-3-319-25897-3_6"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ARES.2009.139"},{"key":"ref5","first-page":"185","article-title":"Dealing with security requirements for sociotechnical systems: A holistic approach","author":"li","year":"2014","journal-title":"Advanced Information Systems Engineering (CAISE 2013)"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ITNG.2009.24"},{"year":"2014","author":"shostack","journal-title":"Threat Modeling Designing for Security","key":"ref7"},{"year":"2011","author":"mitnick","journal-title":"The Art of Deception Controlling the Human Element of Security","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2602087.2602092"},{"key":"ref1","article-title":"Cost of data breach study: Global analysis","author":"ponemon","year":"2015","journal-title":"Poneomon Institute sponsored by IBM Tech Rep"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/11767138_34"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ICRE.2003.1232791"},{"year":"2011","author":"tzu","journal-title":"The Art of War","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/s00766-004-0194-4"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ICSE.2004.1317437"},{"key":"ref26","first-page":"1","article-title":"Reusable knowledge in security requirements engineering: a systematic mapping study","author":"souag","year":"2015","journal-title":"Requirements Engineering"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/s00766-009-0090-z"}],"event":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","start":{"date-parts":[[2016,6,1]]},"location":"Grenoble, France","end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7541913\/7549273\/07549303.pdf?arnumber=7549303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T14:12:08Z","timestamp":1475158328000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7549303\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/rcis.2016.7549303","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}