{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:45:42Z","timestamp":1730292342020,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1109\/re51729.2021.00037","type":"proceedings-article","created":{"date-parts":[[2021,11,18]],"date-time":"2021-11-18T17:22:25Z","timestamp":1637256145000},"page":"334-344","source":"Crossref","is-referenced-by-count":6,"title":["Towards the Integration of Cybersecurity Risk Assessment into Model-based Requirements Engineering"],"prefix":"10.1109","author":[{"given":"Douraid","family":"Naouar","sequence":"first","affiliation":[]},{"given":"Jamal El","family":"Hachem","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Voirin","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Foisil","sequence":"additional","affiliation":[]},{"given":"Yvon","family":"Kermarrec","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","volume":"3","author":"voirin","year":"2018","journal-title":"Conception architecturale des systèmes basée sur les modèles avec la méthode Arcadia"},{"article-title":"The sipri top 100 arms-producing and military services companies","year":"2019","author":"sheet","key":"ref32"},{"key":"ref31","article-title":"Model driven information security management - evaluating and applying the meta model of {ISO} 27001","author":"milicevic","year":"2011","journal-title":"AMCIS"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/j.2334-5837.2019.00639.x"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s20164404"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16874-2_1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55583-2_4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.11.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC51365.2020.00026"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/0471662542"},{"key":"ref13","article-title":"A method for assessing technical progress and quality throughout the system life cycle","author":"ferguson","year":"2009","journal-title":"Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst Tech Rep"},{"journal-title":"Systems engineering return on investment","year":"2013","author":"honour","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.21236\/ADA610517"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2017.7994938"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/5137625"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/PBPC007E"},{"key":"ref19","article-title":"MBSE with the arcadia method and the capella tool","author":"roques","year":"2016","journal-title":"8th European Congress on Embedded Real-Time Software and Systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/app10072574"},{"article-title":"2019 official annual cybercrime report","year":"2019","author":"ventures","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-007-0048-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/itnow\/bwaa103"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110484"},{"key":"ref29","first-page":"639","article-title":"Towards a model-driven based security framework","author":"abdallah","year":"2015","journal-title":"4th International Conference on Model-Driven Engineering and Software Development (MODELSWARD)"},{"journal-title":"The Fourth Industrial Revolution","year":"2017","author":"schwab","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2016.7542911"},{"article-title":"world in motion-systems engineering vision 2025, international council on systems engineering","year":"2014","author":"beihoff","key":"ref7"},{"journal-title":"Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE Developing Cyber-Physical Systems","year":"2013","author":"selic","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26109-6_36"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39512-3"},{"journal-title":"Model-Based Engineering with AADL An Introduction to the SAE Architecture Analysis & Design Language","year":"2012","author":"feiler","key":"ref20"},{"journal-title":"A nationale de la sécurité des systèmes d’information (ANSSI) EBIOS - Expression des besoins et identification des objectifs de sécurité","year":"2010","key":"ref22"},{"key":"ref21","article-title":"The security development lifecycle","volume":"8","author":"howard","year":"2006","journal-title":"Redmond Microsoft Press Google Scholar Google Scholar Digital Library Digital Library"},{"journal-title":"MEHARI - Méthode harmonisée d’analyse des risques","year":"2010","author":"de la s\u00e9curit\u00e9 de l\u2019information fran\u00e7ais","key":"ref24"},{"journal-title":"EBIOS RM - Expression des besoins et identification des objectifs de sécurité Risk Manager","year":"2018","key":"ref23"},{"article-title":"Sp 800-30. risk management guide for information technology systems","year":"2002","author":"stoneburner","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21236\/ADA470450"}],"event":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","start":{"date-parts":[[2021,9,20]]},"location":"Notre Dame, IN, USA","end":{"date-parts":[[2021,9,24]]}},"container-title":["2021 IEEE 29th International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9604522\/9604523\/09604634.pdf?arnumber=9604634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:51:24Z","timestamp":1652187084000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9604634\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/re51729.2021.00037","relation":{},"subject":[],"published":{"date-parts":[[2021,9]]}}}