{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T05:18:32Z","timestamp":1732598312774,"version":"3.28.0"},"reference-count":76,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T00:00:00Z","timestamp":1731369600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1016\/j.infsof.2024.107624","type":"journal-article","created":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T18:36:13Z","timestamp":1731177373000},"page":"107624","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Evaluating the understandability and user acceptance of Attack-Defense Trees: Original experiment and replication"],"prefix":"10.1016","volume":"178","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4737-5761","authenticated-orcid":false,"given":"Giovanna","family":"Broccia","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2930-6367","authenticated-orcid":false,"given":"Maurice H.","family":"ter Beek","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7405-0818","authenticated-orcid":false,"given":"Alberto","family":"Lluch Lafuente","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7922-4936","authenticated-orcid":false,"given":"Paola","family":"Spoletini","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4648-4667","authenticated-orcid":false,"given":"Alessandro","family":"Fantechi","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0636-5663","authenticated-orcid":false,"given":"Alessio","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2024","series-title":"Evaluating the understandability and user acceptance of attack-defense trees: a replicated experiment - replication package","author":"Broccia","key":"10.1016\/j.infsof.2024.107624_b1"},{"key":"10.1016\/j.infsof.2024.107624_b2","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s00766-009-0092-x","article-title":"A comparison of security requirements engineering methods","volume":"15","author":"Fabian","year":"2010","journal-title":"Requir. Eng."},{"issue":"1","key":"10.1016\/j.infsof.2024.107624_b3","first-page":"89","article-title":"Secure-i*: Engineering secure software systems through social analysis","volume":"3","author":"Liu","year":"2009","journal-title":"Int. J. Softw. Inform."},{"key":"10.1016\/j.infsof.2024.107624_b4","series-title":"Proceedings 5th International Conference on the Unified Modeling Language","first-page":"426","article-title":"SecureUML: A UML-based modeling language for model-driven security","volume":"Vol. 2460","author":"Lodderstedt","year":"2002"},{"key":"10.1016\/j.infsof.2024.107624_b5","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.datak.2015.07.007","article-title":"Modelling and reasoning about security requirements in socio-technical systems","volume":"98","author":"Paja","year":"2015","journal-title":"Data Knowl. Eng."},{"key":"10.1016\/j.infsof.2024.107624_b6","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.infsof.2018.04.007","article-title":"Modeling security and privacy requirements: a use case-driven approach","volume":"100","author":"Mai","year":"2018","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2024.107624_b7","series-title":"Revised Selected Papers 7th International Workshop on Formal Aspects of Security and Trust","first-page":"80","article-title":"Foundations of attack-defense trees","volume":"Vol. 6561","author":"Kordy","year":"2010"},{"key":"10.1016\/j.infsof.2024.107624_b8","series-title":"Revised Selected Papers 4th International Workshop on Graphical Models for Security","first-page":"115","article-title":"New directions in attack tree research: Catching up with industrial needs","volume":"Vol. 10744","author":"Gadyatskaya","year":"2017"},{"issue":"4","key":"10.1016\/j.infsof.2024.107624_b9","first-page":"75:1","article-title":"Beyond 2014: formal methods for attack tree-based security modeling","volume":"52","author":"Wide\u0142","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.infsof.2024.107624_b10","series-title":"Proceedings 18th International Colloquium on Theoretical Aspects of Computing","first-page":"214","article-title":"Assessing security of cryptocurrencies with attack-defense trees: Proof of concept and future directions","volume":"Vol. 12819","author":"Eisentraut","year":"2021"},{"issue":"5","key":"10.1016\/j.infsof.2024.107624_b11","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1109\/TIFS.2017.2771238","article-title":"An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception","volume":"13","author":"Lallie","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.infsof.2024.107624_b12","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2019.100219","article-title":"A review of attack graph and attack tree visual syntax in cyber security","volume":"35","author":"Lallie","year":"2020","journal-title":"Comput. Sci. Rev."},{"key":"10.1016\/j.infsof.2024.107624_b13","series-title":"Proceedings 21st International Conference on Program Comprehension","first-page":"33","article-title":"An empirical study on the efficiency of graphical vs. textual representations in requirements comprehension","author":"Sharafi","year":"2013"},{"key":"10.1016\/j.infsof.2024.107624_b14","series-title":"Revised Selected Papers European MDA Workshops: Foundations and Applications","first-page":"77","article-title":"A graphical notation to specify model queries for MDA transformations on UML models","volume":"Vol. 3599","author":"Stein","year":"2004"},{"key":"10.1016\/j.infsof.2024.107624_b15","series-title":"Proceedings 2nd International Conference on Availability, Reliability and Security","first-page":"1034","article-title":"Empirical and statistical analysis of risk analysis-driven techniques for threat management","author":"Buyens","year":"2007"},{"key":"10.1016\/j.infsof.2024.107624_b16","series-title":"Proceedings 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality","first-page":"191","article-title":"On the equivalence between graphical and tabular representations for security risk assessment","volume":"Vol. 10153","author":"Labunets","year":"2017"},{"key":"10.1016\/j.infsof.2024.107624_b17","series-title":"Proceedings 7th International Symposium on Empirical Software Engineering and Measurement","first-page":"163","article-title":"An experimental comparison of two risk-based security methods","author":"Labunets","year":"2013"},{"issue":"3","key":"10.1016\/j.infsof.2024.107624_b18","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","author":"Davis","year":"1989","journal-title":"MIS Q."},{"key":"10.1016\/j.infsof.2024.107624_b19","series-title":"Proceedings 11th European Conference on Information Systems","first-page":"1327","article-title":"The method evaluation model: a theoretical model for validating information systems design methods","author":"Moody","year":"2003"},{"issue":"3","key":"10.1016\/j.infsof.2024.107624_b20","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"MIS Q."},{"key":"10.1016\/j.infsof.2024.107624_b21","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s10664-008-9060-1","article-title":"The role of replications in empirical software engineering","volume":"13","author":"Shull","year":"2008","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.infsof.2024.107624_b22","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s10664-008-9061-0","article-title":"The role of replications in empirical software engineering\u2014a word of warning","volume":"13","author":"Kitchenham","year":"2008","journal-title":"Empir. Softw. Eng."},{"year":"2001","series-title":"Dealing with Complexity: A Practical Method for Representing Large Entity Relationship Models","author":"Moody","key":"10.1016\/j.infsof.2024.107624_b23"},{"key":"10.1016\/j.infsof.2024.107624_b24","series-title":"Proceedings 30th International Working Conference on Requirements Engineering: Foundation for Software Quality","first-page":"39","article-title":"Assessing the understandability and acceptance of attack-defense trees for modelling security requirements","volume":"Vol. 14588","author":"Broccia","year":"2024"},{"key":"10.1016\/j.infsof.2024.107624_b25","series-title":"Proceedings 25th International Conference on Requirements Engineering","first-page":"174","article-title":"Does goal-oriented requirements engineering achieve its goal?","author":"Mavin","year":"2017"},{"issue":"11","key":"10.1016\/j.infsof.2024.107624_b26","doi-asserted-by":"crossref","first-page":"4675","DOI":"10.1109\/TSE.2021.3124677","article-title":"Systematic evaluation and usability analysis of formal methods tools for railway signaling system design","volume":"48","author":"Ferrari","year":"2022","journal-title":"IEEE Trans. Softw. Eng."},{"year":"1981","series-title":"Fault Tree Handbook","author":"Vesely","key":"10.1016\/j.infsof.2024.107624_b27"},{"key":"10.1016\/j.infsof.2024.107624_b28","article-title":"Attack trees","author":"Schneier","year":"1999","journal-title":"Dr. Dobb\u2019s J."},{"key":"10.1016\/j.infsof.2024.107624_b29","series-title":"Revised Selected Papers 8th International Conference on Information Security and Cryptology","first-page":"186","article-title":"Foundations of attack trees","volume":"Vol. 3935","author":"Mauw","year":"2005"},{"key":"10.1016\/j.infsof.2024.107624_b30","series-title":"Proceedings 10th International Conference on Quantitative Evaluation of Systems","first-page":"173","article-title":"ADTool: Security analysis with attack-defense trees","volume":"Vol. 8054","author":"Kordy","year":"2013"},{"key":"10.1016\/j.infsof.2024.107624_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102381","article-title":"Quantitative security risk modeling and analysis with RisQFLan","volume":"109","author":"ter Beek","year":"2021","journal-title":"Comput. Secur."},{"key":"10.1016\/j.infsof.2024.107624_b32","series-title":"Proceedings 11th International Conference on Risks and Security of Internet and Systems","first-page":"105","article-title":"SPTool \u2013 equivalence checker for SAND attack trees","volume":"Vol. 10158","author":"Kordy","year":"2016"},{"key":"10.1016\/j.infsof.2024.107624_b33","series-title":"Proceedings 21st International Conference on Fundamental Approaches To Software Engineering","first-page":"56","article-title":"Effective analysis of attack trees: A model-driven approach","volume":"Vol. 10802","author":"Kumar","year":"2018"},{"year":"2006","series-title":"The SecuITree\u00ae BurgleHouse Tutorial (a.k.a., Who wants to be a Cat Burglar?)","author":"Limited","key":"10.1016\/j.infsof.2024.107624_b34"},{"key":"10.1016\/j.infsof.2024.107624_b35","series-title":"Proceedings 22nd European Symposium on Research in Computer Security","first-page":"83","article-title":"Is my attack tree correct?","volume":"Vol. 10492","author":"Audinot","year":"2017"},{"key":"10.1016\/j.infsof.2024.107624_b36","series-title":"Proceedings 7th International Conference on Principles of Security and Trust","first-page":"325","article-title":"On quantitative analysis of attack-defense trees with repeated labels","volume":"Vol. 10804","author":"Kordy","year":"2018"},{"issue":"16","key":"10.1016\/j.infsof.2024.107624_b37","doi-asserted-by":"crossref","first-page":"3356","DOI":"10.1016\/j.ins.2011.04.005","article-title":"Evaluating requirements modeling methods based on user perceptions: A family of experiments","volume":"181","author":"Abrah\u00e3o","year":"2011","journal-title":"Inform. Sci."},{"key":"10.1016\/j.infsof.2024.107624_b38","series-title":"Proceedings 4th SESAR Innovation Days","article-title":"A first empirical evaluation framework for security risk assessment methods in the ATM domain","author":"Labunets","year":"2014"},{"key":"10.1016\/j.infsof.2024.107624_b39","series-title":"Proceedings 31st International Conference on Program Comprehension","first-page":"54","article-title":"Evaluating a language workbench: from working memory capacity to comprehension to acceptance","author":"Broccia","year":"2023"},{"issue":"4","key":"10.1016\/j.infsof.2024.107624_b40","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.csi.2010.01.006","article-title":"A systematic review of security requirements engineering","volume":"32","author":"Mellado","year":"2010","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.infsof.2024.107624_b41","series-title":"Proceedings 6th International Conference on Research Challenges in Information Science","first-page":"1","article-title":"Cloud computing security requirements: a systematic review","author":"Iankoulova","year":"2012"},{"key":"10.1016\/j.infsof.2024.107624_b42","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s00766-015-0220-8","article-title":"Reusable knowledge in security requirements engineering: a systematic mapping study","volume":"21","author":"Souag","year":"2016","journal-title":"Requir. Eng."},{"key":"10.1016\/j.infsof.2024.107624_b43","series-title":"Proceedings 44th Euromicro Conference on Software EnGineering and Advanced Applications","first-page":"454","article-title":"A systematic mapping study on security in agile requirements engineering","author":"Villamizar","year":"2018"},{"key":"10.1016\/j.infsof.2024.107624_b44","series-title":"Proceedings 20th International Requirements Engineering Conference","first-page":"111","article-title":"Requirements-driven adaptive security: Protecting variable assets at runtime","author":"Salehie","year":"2012"},{"key":"10.1016\/j.infsof.2024.107624_b45","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","article-title":"Eliciting security requirements with misuse cases","volume":"10","author":"Sindre","year":"2005","journal-title":"Requir. Eng."},{"key":"10.1016\/j.infsof.2024.107624_b46","series-title":"Integrating Security and Software Engineering: Advances and Future Visions","first-page":"160","article-title":"Modelling security and trust with secure Tropos","author":"Giorgini","year":"2007"},{"key":"10.1016\/j.infsof.2024.107624_b47","series-title":"Model-Driven Risk Analysis: The CORAS Approach","first-page":"23","article-title":"A guided tour of the CORAS method","author":"Lund","year":"2011"},{"year":"2010","series-title":"Model-Driven Risk Analysis: The CORAS Approach","author":"Lund","key":"10.1016\/j.infsof.2024.107624_b48"},{"key":"10.1016\/j.infsof.2024.107624_b49","series-title":"Proceedings 17th Nordic Conference on Secure IT Systems","first-page":"89","article-title":"How to select a security requirements method? A comparative study with students and practitioners","volume":"Vol. 7617","author":"Massacci","year":"2012"},{"key":"10.1016\/j.infsof.2024.107624_b50","series-title":"Proceedings 4th International Workshop on Empirical Requirements Engineering","first-page":"28","article-title":"An experiment on comparing textual vs. visual industrial methods for security risk assessment","author":"Labunets","year":"2014"},{"year":"2000","series-title":"Problem Frames: Analysing and Structuring Software Development Problems","author":"Jackson","key":"10.1016\/j.infsof.2024.107624_b51"},{"issue":"1","key":"10.1016\/j.infsof.2024.107624_b52","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/TSE.2007.70754","article-title":"Security requirements engineering: A framework for representation and analysis","volume":"34","author":"Haley","year":"2008","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2024.107624_b53","series-title":"Security risk assessment methodology","first-page":"42","author":"European air Traffic Management (EATM)","year":"2008"},{"key":"10.1016\/j.infsof.2024.107624_b54","series-title":"Proceedings 11th European Symposium on Research in Computer Security","first-page":"192","article-title":"Applying a security requirements engineering process","volume":"Vol. 4189","author":"Mellado","year":"2006"},{"key":"10.1016\/j.infsof.2024.107624_b55","series-title":"Proceedings 13th International Conference on Risks and Security of Internet and Systems","first-page":"1","article-title":"An empirical study on the comprehensibility of graphical security risk models based on sequence diagrams","volume":"Vol. 11391","author":"Volden-Freberg","year":"2018"},{"key":"10.1016\/j.infsof.2024.107624_b56","series-title":"Proceedings 2nd International Conference on Recent Trends in Computer Networks and Distributed Systems Security","first-page":"239","article-title":"A graph data model for attack graph generation and analysis","volume":"Vol. 420","author":"Barik","year":"2014"},{"key":"10.1016\/j.infsof.2024.107624_b57","series-title":"Proceedings 9th International Conference on Model Driven Engineering Languages and Systems","first-page":"574","article-title":"A graphical approach to risk identification, motivated by empirical investigations","volume":"Vol. 4199","author":"Hogganvik","year":"2006"},{"key":"10.1016\/j.infsof.2024.107624_b58","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.infsof.2017.09.001","article-title":"Factors influencing the understandability of process models: A systematic literature review","volume":"93","author":"Dikici","year":"2018","journal-title":"Inf. Softw. Technol."},{"issue":"2","key":"10.1016\/j.infsof.2024.107624_b59","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1006\/jvlc.1996.0009","article-title":"Usability analysis of visual programming environments: A \u2018cognitive dimensions\u2019 framework","volume":"7","author":"Green","year":"1996","journal-title":"J. Vis. Lang. Comput."},{"issue":"2","key":"10.1016\/j.infsof.2024.107624_b60","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1207\/s15516709cog1202_4","article-title":"Cognitive load during problem solving: Effects on learning","volume":"12","author":"Sweller","year":"1988","journal-title":"Cogn. Sci."},{"key":"10.1016\/j.infsof.2024.107624_b61","series-title":"Proceedings 17th IRES International Conference","article-title":"How is technology accepted by users? A review of technology acceptance models and theories","author":"Alomary","year":"2015"},{"issue":"1","key":"10.1016\/j.infsof.2024.107624_b62","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","article-title":"Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology","volume":"36","author":"Venkatesh","year":"2012","journal-title":"MIS Q."},{"year":"1975","series-title":"Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research","author":"Fishbein","key":"10.1016\/j.infsof.2024.107624_b63"},{"year":"1986","series-title":"Social Foundations of Thought & Action: A Social Cognitive Theory","author":"Bandura","key":"10.1016\/j.infsof.2024.107624_b64"},{"key":"10.1016\/j.infsof.2024.107624_b65","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organ. Behav. Hum. Decis. Process."},{"issue":"2","key":"10.1016\/j.infsof.2024.107624_b66","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","article-title":"Technology acceptance model 3 and a research agenda on interventions","volume":"39","author":"Venkatesh","year":"2008","journal-title":"Decis. Sci."},{"issue":"5","key":"10.1016\/j.infsof.2024.107624_b67","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1108\/K-09-2014-0184","article-title":"A comparison of the different versions of popular technology acceptance models: A non-linear perspective","volume":"44","author":"Rondan-Catalu\u00f1a","year":"2015","journal-title":"Kybernetes"},{"year":"2024","series-title":"Experimentation in Software Engineering","author":"Wohlin","key":"10.1016\/j.infsof.2024.107624_b68"},{"key":"10.1016\/j.infsof.2024.107624_b69","series-title":"Proceedings 36th International Conference on Software Maintenance and Evolution","first-page":"348","article-title":"Evaluating code readability and legibility: An examination of human-centric studies","author":"Oliveira","year":"2020"},{"year":"2024","series-title":"Academic grading in Italy","author":"Wikipedia: The Free Encyclopedia","key":"10.1016\/j.infsof.2024.107624_b70"},{"key":"10.1016\/j.infsof.2024.107624_b71","series-title":"Proceedings 14th International Working Conference on Variability Modelling of Software-Intensive Systems","first-page":"11:1","article-title":"Variability meets security: Quantitative security modeling and analysis of highly customizable attack scenarios","author":"ter Beek","year":"2020"},{"key":"10.1016\/j.infsof.2024.107624_b72","doi-asserted-by":"crossref","first-page":"1:1","DOI":"10.2466\/11.IT.3.1","article-title":"The simple difference formula: an approach to teaching nonparametric correlation","volume":"3","author":"Kerby","year":"2014","journal-title":"Compr. Psychol."},{"issue":"3","key":"10.1016\/j.infsof.2024.107624_b73","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1037\/0033-2909.114.3.494","article-title":"Dominance statistics: Ordinal analyses to answer ordinal questions","volume":"114","author":"Cliff","year":"1993","journal-title":"Psychol. Bull."},{"issue":"2","key":"10.1016\/j.infsof.2024.107624_b74","doi-asserted-by":"crossref","first-page":"1513","DOI":"10.1007\/s10270-017-0623-8","article-title":"FlexiSketch: a lightweight sketching and metamodeling approach for end-users","volume":"18","author":"W\u00fcest","year":"2019","journal-title":"Softw. Syst. Model."},{"issue":"1","key":"10.1016\/j.infsof.2024.107624_b75","doi-asserted-by":"crossref","first-page":"43","DOI":"10.3102\/00346543059001043","article-title":"Models for understanding","volume":"59","author":"Mayer","year":"1989","journal-title":"Rev. Educ. Res."},{"key":"10.1016\/j.infsof.2024.107624_b76","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.scico.2014.11.013","article-title":"Six strategies for generalizing software engineering theories","volume":"101","author":"Wieringa","year":"2015","journal-title":"Sci. Comput. Program."}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584924002295?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584924002295?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T03:45:53Z","timestamp":1732592753000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584924002295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":76,"alternative-id":["S0950584924002295"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2024.107624","relation":{},"ISSN":["0950-5849"],"issn-type":[{"type":"print","value":"0950-5849"}],"subject":[],"published":{"date-parts":[[2025,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Evaluating the understandability and user acceptance of Attack-Defense Trees: Original experiment and replication","name":"articletitle","label":"Article Title"},{"value":"Information and Software Technology","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.infsof.2024.107624","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"107624"}}