{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:25:34Z","timestamp":1725881134313},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319540443"},{"type":"electronic","value":"9783319540450"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54045-0_15","type":"book-chapter","created":{"date-parts":[[2017,2,20]],"date-time":"2017-02-20T12:33:18Z","timestamp":1487593998000},"page":"191-208","source":"Crossref","is-referenced-by-count":10,"title":["On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment"],"prefix":"10.1007","author":[{"given":"Katsiaryna","family":"Labunets","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]},{"given":"Federica","family":"Paci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,21]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Caralli, R., Stevens, J., Young, L., Wilson, W.: Introducing OCTAVE allegro: improving the information security risk assessment process. Technical report, Software Engineering Institute, Carnegie Mellon University (2007)","DOI":"10.21236\/ADA470450"},{"issue":"1","key":"15_CR2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s10664-009-9109-9","volume":"15","author":"JC Carver","year":"2010","unstructured":"Carver, J.C., Jaccheri, L., Morasca, S., Shull, F.: A checklist for integrating student empirical studies with research and teaching goals. Empir. Softw. Eng. 15(1), 35\u201359 (2010)","journal-title":"Empir. Softw. Eng."},{"key":"15_CR3","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13, 319\u2013340 (1989)","journal-title":"MIS Q."},{"issue":"1","key":"15_CR4","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00766-010-0115-7","volume":"16","author":"M Deng","year":"2011","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulllment of privacy requirements. Req. Eng. 16(1), 3\u201332 (2011)","journal-title":"Req. Eng."},{"key":"15_CR5","unstructured":"Food, D.A.: Guidance for industry: statistical approaches to establishing bioequivalence (2001)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling security requirements through ownership, permission and delegation. In: Proceedings of RE 2005, pp. 167\u2013176. IEEE (2005)","DOI":"10.1109\/RE.2005.43"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-319-16101-3_7","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"M Gramatica de","year":"2015","unstructured":"de Gramatica, M., Labunets, K., Massacci, F., Paci, F., Tedeschi, A.: The role of catalogues of threats and security controls in security risk assessment: an empirical study with ATM professionals. In: Fricker, S.A., Schneider, K. (eds.) REFSQ 2015. LNCS, vol. 9013, pp. 98\u2013114. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-16101-3_7"},{"issue":"1","key":"15_CR8","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"C Haley","year":"2008","unstructured":"Haley, C., Laney, R., Moett, J., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133\u2013153 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR9","unstructured":"Hernan, S., Lambert, S., Ostwald, T., Shostack, A.: Threat modeling-uncover security design flaws using the stride approach. MSDN Magazine-Louisville, pp. 68\u201375 (2006)"},{"issue":"3","key":"15_CR10","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1023\/A:1026586415054","volume":"5","author":"M H\u00f6st","year":"2000","unstructured":"H\u00f6st, M., Regnell, B., Wohlin, C.: Using students as subjects: a comparative study of students and professionals in lead-time impact assessment. Empir. Softw. Eng. 5(3), 201\u2013214 (2000)","journal-title":"Empir. Softw. Eng."},{"issue":"3","key":"15_CR11","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.infsof.2013.10.004","volume":"56","author":"P Karpati","year":"2014","unstructured":"Karpati, P., Redda, Y., Opdahl, A.L., Sindre, G.: Comparing attack trees and misuse cases in an industrial setting. Inform. Soft. Technol. 56(3), 294\u2013308 (2014)","journal-title":"Inform. Soft. Technol."},{"key":"15_CR12","unstructured":"Kopardekar, P.H.: Unmanned aerial system (UAS) traffic management (UTM): Enabling low-altitude airspace and UAS operations. Technical report (2014)"},{"key":"15_CR13","unstructured":"Kopardekar, P.H.: Revising the airspace model for the safe integration of small unmanned aircraft systems. Technical report (2015)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Labunets, K., Massacci, F., Paci, F., Tran, L.M.S.: An experimental comparison of two risk-based security methods. In: Proceedings of ESEM 2013, pp. 163\u2013172. IEEE (2013)","DOI":"10.1109\/ESEM.2013.29"},{"key":"15_CR15","unstructured":"Labunets, K., Paci, F., Massacci, F., Ragosta, M., Solhaug, B.: A first empirical evaluation framework for security risk assessment methods in the ATM domain. In: Proceedings of SIDs 2014. SESAR (2014)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Labunets, K., Paci, F., Massacci, F., Ruprai, R.: An experiment on comparing textual vs. visual industrial methods for security risk assessment. In: Proceedings of EmpiRE Workshop at RE 2014, pp. 28\u201335. IEEE (2014)","DOI":"10.1109\/EmpiRE.2014.6890113"},{"key":"15_CR17","doi-asserted-by":"crossref","DOI":"10.1201\/9781420031232","volume-title":"The Security Risk Assessment Handbook: A Complete Guide For Performing Security Risk Assessments","author":"DJ Landoll","year":"2005","unstructured":"Landoll, D.J., Landoll, D.: The Security Risk Assessment Handbook: A Complete Guide For Performing Security Risk Assessments. CRC Press, New York (2005)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-319-07881-6_20","volume-title":"Advanced Information Systems Engineering","author":"T Li","year":"2014","unstructured":"Li, T., Horkoff, J.: Dealing with security requirements for socio-technical systems: a holistic approach. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 285\u2013300. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-07881-6_20"},{"key":"15_CR19","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/978-3-642-12323-8_3","volume-title":"Model-Driven Risk Analysis","author":"MS Lund","year":"2011","unstructured":"Lund, M.S., Solhaug, B., Stolen, K.: A guided tour of the CORAS method. In: Lund, M.S., Solhaug, B., Stolen, K. (eds.) Model-Driven Risk Analysis, pp. 23\u201343. Springer, Heidelberg (2011)"},{"issue":"1","key":"15_CR20","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MS.2005.8","volume":"22","author":"N Maiden","year":"2005","unstructured":"Maiden, N., Robertson, S., Ebert, C.: Guest editors\u2019 introduction: shake, rattle, and requirements. IEEE Softw. 22(1), 13 (2005)","journal-title":"IEEE Softw."},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-34210-3_7","volume-title":"Secure IT Systems","author":"F Massacci","year":"2012","unstructured":"Massacci, F., Paci, F.: How to select a security requirements method? A Comparative study with students and practitioners. In: J\u00f8sang, A., Carlsson, B. (eds.) NordSec 2012. LNCS, vol. 7617, pp. 89\u2013104. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34210-3_7"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/11863908_13","volume-title":"Computer Security \u2013 ESORICS 2006","author":"D Mellado","year":"2006","unstructured":"Mellado, D., Fern\u00e1ndez-Medina, E., Piattini, M.: Applying a security requirements engineering process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 192\u2013206. Springer, Heidelberg (2006). doi: 10.1007\/11863908_13"},{"issue":"2","key":"15_CR23","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.foodqual.2012.05.003","volume":"26","author":"M Meyners","year":"2012","unstructured":"Meyners, M.: Equivalence tests a review. Food Qual. Prefer. 26(2), 231\u2013245 (2012)","journal-title":"Food Qual. Prefer."},{"issue":"02","key":"15_CR24","first-page":"285","volume":"17","author":"H Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Inform. Syst. Model. Des. 17(02), 285\u2013309 (2007)","journal-title":"Int. J. Inform. Syst. Model. Des."},{"issue":"5","key":"15_CR25","doi-asserted-by":"crossref","first-page":"916","DOI":"10.1016\/j.infsof.2008.05.013","volume":"51","author":"AL Opdahl","year":"2009","unstructured":"Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Inform. Soft. Tech. 51(5), 916\u2013932 (2009)","journal-title":"Inform. Soft. Tech."},{"key":"15_CR26","first-page":"1","volume":"20","author":"R Scandariato","year":"2014","unstructured":"Scandariato, R., Wuyts, K., Joosen, W.: A descriptive study of Microsoft\u2019s threat modeling technique. Req. Eng. 20, 1\u201318 (2014)","journal-title":"Req. Eng."},{"key":"15_CR27","unstructured":"Schuirmann, D.: On hypothesis-testing to determine if the mean of a normal distribution is contained in a known interval. In: Biometrics. vol. 37, pp. 617-617. International Biometric Soc (1981)"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"SESAR: ATM Security Risk Assessment Methodology. SESAR WP16.2 ATM Security, February 2003","DOI":"10.1016\/S1361-3723(03)03002-1"},{"key":"15_CR29","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-642-31072-0_26","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"T St\u00e5lhane","year":"2012","unstructured":"St\u00e5lhane, T., Sindre, G.: Identifying safety hazards: an experimental comparison of system diagrams and textual use cases. In: Bider, I., Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Wrycza, S. (eds.) BPMDS\/EMMSAD -2012. LNBIP, vol. 113, pp. 378\u2013392. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-31072-0_26"},{"key":"15_CR30","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-642-31072-0_26","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"T St\u00e5lhane","year":"2012","unstructured":"St\u00e5lhane, T., Sindre, G.: Identifying safety hazards: an experimental comparison of system diagrams and textual use cases. In: Bider, I., Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Wrycza, S. (eds.) BPMDS\/EMMSAD -2012. LNBIP, vol. 113, pp. 378\u2013392. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-31072-0_26"},{"issue":"1","key":"15_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/ijismd.2014010101","volume":"5","author":"T St\u00e5lhane","year":"2014","unstructured":"St\u00e5lhane, T., Sindre, G.: An experimental comparison of system diagrams and textual use cases for the identification of safety hazards. Int. J. Inform. Syst. Model. Des. 5(1), 1\u201324 (2014)","journal-title":"Int. J. Inform. Syst. Model. Des."},{"key":"15_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-13094-6_14","volume-title":"Advanced Information Systems Engineering","author":"T St\u00e5lhane","year":"2010","unstructured":"St\u00e5lhane, T., Sindre, G., Bousquet, L.: Comparing safety analysis based on sequence diagrams and textual use cases. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 165\u2013179. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13094-6_14"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Svahnberg, M., Aurum, A., Wohlin, C.: Using students as subjects - an empirical evaluation. In: Proceedings of ESEM 2008, pp. 288\u2013290. ACM (2008)","DOI":"10.1145\/1414004.1414055"},{"key":"15_CR34","unstructured":"Theilmann, C.A.: Integrating autonomous drones into the national aerospace system. Ph.D. thesis, University of Pennsylvania, PA, US, April 2015"},{"key":"15_CR35","unstructured":"Van Lamsweerde, A.: Goal-oriented requirements engineering: a guided tour. In: Proceedings of RE 2001, pp. 249\u2013262. IEEE (2001)"},{"key":"15_CR36","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in Software Engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B., Wesslen, A.: Experimentation in Software Engineering. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54045-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T21:56:44Z","timestamp":1568843804000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-54045-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319540443","9783319540450"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54045-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}