{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T22:43:50Z","timestamp":1725403430765},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/re.2015.7320439","type":"proceedings-article","created":{"date-parts":[[2015,11,5]],"date-time":"2015-11-05T17:57:15Z","timestamp":1446746235000},"page":"282-283","source":"Crossref","is-referenced-by-count":2,"title":["Holistic security requirements analysis: An attacker's perspective"],"prefix":"10.1109","author":[{"given":"Tong","family":"Li","sequence":"first","affiliation":[]},{"given":"Elda","family":"Paja","sequence":"additional","affiliation":[]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]},{"given":"Jennifer","family":"Horkoff","sequence":"additional","affiliation":[]},{"given":"Kristian","family":"Beckers","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317437"},{"key":"ref6","article-title":"Dealing with security requirements for sociotechnical systems: A holistic approach","author":"li","year":"2014","journal-title":"CAiSE'14"},{"journal-title":"Threat Modeling Designing for Security","year":"2014","author":"shostack","key":"ref5"},{"journal-title":"Counter Hack Reloaded A Step-by-step Guide to Computer Attacks and Effective Defenses","year":"2005","author":"skoudis","key":"ref8"},{"journal-title":"The Art of Deception Controlling the Human Element of Security","year":"2011","author":"mitnick","key":"ref7"},{"key":"ref2","article-title":"Attack patterns as a knowledge resource for building secure software","author":"barnum","year":"2007","journal-title":"OMG Software Assurance Workshop Cigital"},{"journal-title":"Securing the Smart Grid Next Generation Power Grid Security","year":"2010","author":"flick","key":"ref1"}],"event":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","start":{"date-parts":[[2015,8,24]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2015,8,28]]}},"container-title":["2015 IEEE 23rd International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7310793\/7320393\/07320439.pdf?arnumber=7320439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:00:40Z","timestamp":1490392840000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7320439\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/re.2015.7320439","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}