{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T22:24:59Z","timestamp":1771453499461,"version":"3.50.1"},"reference-count":80,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004686","name":"Deanship of Scientific Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004686","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004055","name":"King Fahd University of Petroleum and Minerals","doi-asserted-by":"publisher","award":["IN141010"],"award-info":[{"award-number":["IN141010"]}],"id":[{"id":"10.13039\/501100004055","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2015,7,1]]},"DOI":"10.1109\/tse.2015.2396526","type":"journal-article","created":{"date-parts":[[2015,2,13]],"date-time":"2015-02-13T14:51:26Z","timestamp":1423839086000},"page":"661-690","source":"Crossref","is-referenced-by-count":23,"title":["Extending the UML Statecharts Notation to Model Security Aspects"],"prefix":"10.1109","volume":"41","author":[{"given":"Mohamed","family":"El-Attar","sequence":"first","affiliation":[{"name":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Kingdom of Saudi Arabia"}]},{"given":"Hamza","family":"Luqman","sequence":"additional","affiliation":[{"name":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Kingdom of Saudi Arabia"}]},{"given":"P\u00e9ter","family":"K\u00e1rp\u00e1ti","sequence":"additional","affiliation":[{"name":"Institute for Energy Technology, Halden, Norway"}]},{"given":"Guttorm","family":"Sindre","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, Norwegian University of Science and Technology, Trondheim, Norway"}]},{"given":"Andreas L.","family":"Opdahl","sequence":"additional","affiliation":[{"name":"Department of Information Science and Media, University of Bergen, Bergen, Norway"}]}],"member":"263","reference":[{"key":"ref73","article-title":"AndroidOS.FakePlayer description","year":"2010"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264860"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31069-0_5"},{"key":"ref70","first-page":"1","article-title":"Generalization\/specialization as a structuring mechanism for misuse cases","author":"sindre","year":"2002","journal-title":"Proc Symp Requirements Eng for Information Security"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1002\/col.20594"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-009-0114-7"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/978-3-642-19751-2_6","article-title":"Foundations of attack&#x2014;defense trees","author":"kordy","year":"2011","journal-title":"Formal Aspects of Security and Trust"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317437"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2010.0038"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/32.60316"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1006\/ceps.1993.1016"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/38.946634"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/606658.606659"},{"key":"ref31","first-page":"10","article-title":"The details of conceptual modelling notations are important&#x2014;a comparison of relationship normative language","volume":"9","author":"hitchman","year":"2002","journal-title":"Commun Assoc Inf Syst"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2007100101"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16782-9_1"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14192-8_24"},{"key":"ref35","first-page":"412","article-title":"UMLsec: Extending UML for secure systems development","author":"j\u00fcrjens","year":"2002","journal-title":"Proc 5th Int Conf UML - Unified Model Language"},{"key":"ref34","author":"j\u00fcrjens","year":"2005","journal-title":"Secure Systems Development with UML"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2087017"},{"key":"ref62","first-page":"33","article-title":"An extended misuse case notation: Including vulnerabilities and the insider threat","author":"r\u00f8stad","year":"2006","journal-title":"Proc 19th Working Conf Requirements Eng Foundations for Software Quality"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.2307\/2685263"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/spip.150"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21640-4_28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.1996.0009"},{"key":"ref64","article-title":"Attack trees","author":"schneier","year":"1999","journal-title":"Dr Dobb's J"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.2307\/1267427"},{"key":"ref29","first-page":"1","article-title":"Integrating formal analysis and design to preserve security properties","author":"hassan","year":"2009","journal-title":"Proc 42nd Hawaii Int Conf Syst Sci"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2004010103"},{"key":"ref67","author":"siegel","year":"1988","journal-title":"Non-Parametric Statistics for the Behavioral Sciences"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/2.889093"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73031-6_27"},{"key":"ref1","author":"amoroso","year":"1994","journal-title":"Fundamentals of Computer Security Technology"},{"key":"ref20","first-page":"183","article-title":"Formalizing information security knowledge","author":"fenz","year":"2009","journal-title":"Proc ACM Symp Informa Comput Commun Security"},{"key":"ref22","author":"gane","year":"1979","journal-title":"Structured Systems Analysis Tools and Techniques"},{"key":"ref21","first-page":"43","article-title":"How conceptual modeling is used","volume":"25","author":"fettke","year":"2009","journal-title":"Commun Assoc Inf Syst"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16782-9_11"},{"key":"ref23","author":"goodman","year":"1968","journal-title":"Languages of Art An approach to a theory of symbols"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2006.04.004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.43.10.1387"},{"key":"ref50","author":"mitnick","year":"2009","journal-title":"The Art of Intrusion The Real Stories Behind the Exploits of Hackers Intruders and Deceivers"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.67"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2004.01.003"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016344215610"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/505532.505535"},{"key":"ref56","author":"paivio","year":"1986","journal-title":"Mental Representations A Dual Coding Approach"},{"key":"ref55","article-title":"Unified modeling language","year":"2011"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.1999.00052.x"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/spip.261"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194007003240"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2003.1233846"},{"key":"ref11","article-title":"Cognitive dimensions of notations resource site","author":"blackwell","year":"2009"},{"key":"ref40","article-title":"Software vulnerability analysis","author":"krsul","year":"1998"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860808-5\/50005-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2006.04.006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(93)90021-G"},{"key":"ref15","author":"demarco","year":"1979","journal-title":"Structured Analysis and System Specification"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-1-5041-2919-0_8","article-title":"A framework for dealing with and specifying security requirements in information systems","author":"dubois","year":"1996","journal-title":"Inform Syst Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2011.11"},{"key":"ref18","article-title":"Companion website to security enabled statecharts research","author":"el-attar","year":"2013"},{"key":"ref19","first-page":"1","article-title":"Fault tree analysis&#x2014;a history","author":"ericson","year":"1999","journal-title":"Proc 17th Int System Safety Conf"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1801_3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315250"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00125-X"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775425"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2006.01759.x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.1999.9667269"},{"key":"ref7","author":"bertin","year":"1983","journal-title":"Semiology of Graphics Diagrams Networks Maps"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"ref9","first-page":"135","article-title":"Feature-interaction visualisation and resolution in an agent environment","author":"buhr","year":"1998","journal-title":"Proc Feature Interaction in Telecommun and Software Sys VI"},{"key":"ref46","first-page":"426","article-title":"SecureUML: A UML-based modeling language for model-driven security","author":"lodderstedt","year":"2002","journal-title":"Proc 5th Int Conf UML - Unified Model Language"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2008070102"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/22949.22950"},{"key":"ref42","author":"lehmann","year":"1998","journal-title":"Nonparametrics Statistical Methods Based on Ranks"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1111\/j.1551-6708.1987.tb00863.x"},{"key":"ref44","year":"2015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232791"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7156214\/07042284.pdf?arnumber=7042284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T21:17:35Z","timestamp":1771449455000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7042284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,1]]},"references-count":80,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tse.2015.2396526","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,1]]}}}