{"id":"https://openalex.org/W4394709694","doi":"https://doi.org/10.48550/arxiv.2404.06386","title":"Assessing the Understandability and Acceptance of Attack-Defense Trees\n for Modelling Security Requirements","display_name":"Assessing the Understandability and Acceptance of Attack-Defense Trees\n for Modelling Security Requirements","publication_year":2024,"publication_date":"2024-04-09","ids":{"openalex":"https://openalex.org/W4394709694","doi":"https://doi.org/10.48550/arxiv.2404.06386"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2404.06386","pdf_url":"http://arxiv.org/pdf/2404.06386","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://arxiv.org/pdf/2404.06386","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068337609","display_name":"Giovanna Broccia","orcid":"https://orcid.org/0000-0002-4737-5761"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Broccia, Giovanna","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064415269","display_name":"Maurice H. ter Beek","orcid":"https://orcid.org/0000-0002-2930-6367"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"ter Beek, Maurice H.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054527006","display_name":"Alberto Lluch Lafuente","orcid":"https://orcid.org/0000-0001-7405-0818"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lafuente, Alberto Lluch","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057896873","display_name":"Paola Spoletini","orcid":"https://orcid.org/0000-0001-7922-4936"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Spoletini, Paola","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5040962321","display_name":"Alessio Ferrari","orcid":"https://orcid.org/0000-0002-0636-5663"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ferrari, Alessio","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":84},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.992,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.992,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9643,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49895906}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2404.06386","pdf_url":"http://arxiv.org/pdf/2404.06386","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2404.06386","pdf_url":"http://arxiv.org/pdf/2404.06386","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391913857","https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2478288626","https://openalex.org/W2390279801","https://openalex.org/W2382290278","https://openalex.org/W2376932109","https://openalex.org/W2358668433","https://openalex.org/W2350741829","https://openalex.org/W2001405890"],"abstract_inverted_index":{"Context":[0],"and":[1,13,34,91,104,117,142],"Motivation":[2],"Attack-Defense":[3],"Trees":[4],"(ADTs)":[5],"are":[6,18,36],"a":[7,68,131],"graphical":[8],"notation":[9,52],"used":[10],"to":[11,39,87,146,163],"model":[12,44],"assess":[14,88],"security":[15,32,167],"requirements.":[16],"ADTs":[17],"widely":[19],"popular,":[20],"as":[21,67],"they":[22,35,119,143],"can":[23],"facilitate":[24],"communication":[25],"between":[26,114],"different":[27],"stakeholders":[28],"involved":[29],"in":[30],"system":[31],"evaluation,":[33],"formal":[37],"enough":[38],"be":[40],"verified,":[41],"e.g.,":[42],"with":[43,83,107],"checkers.":[45],"Question/Problem":[46],"While":[47],"the":[48,89,95,108,112,122,126,152,157,164],"quality":[49],"of":[50,94,110,125,134,136,159,166],"this":[51,77],"has":[53,60],"been":[54,62],"primarily":[55],"assessed":[56],"quantitatively,":[57],"its":[58,72],"understandability":[59,90,135,158],"never":[61],"evaluated":[63],"despite":[64],"being":[65],"mentioned":[66],"key":[69],"factor":[70],"for":[71],"success.":[73],"Principal":[74],"idea/Results":[75],"In":[76],"paper,":[78],"we":[79],"conduct":[80],"an":[81],"experiment":[82],"25":[84],"human":[85],"subjects":[86],"user":[92],"acceptance":[93],"ADT":[96],"notation.":[97,127],"The":[98,128],"study":[99,154],"focuses":[100],"on":[101],"performance-based":[102],"variables":[103],"perception-based":[105],"variables,":[106],"aim":[109],"evaluating":[111],"relationship":[113],"these":[115],"measures":[116],"how":[118],"might":[120],"impact":[121],"practical":[123],"use":[124,147],"results":[129],"confirm":[130],"good":[132],"level":[133],"ADTs.":[137],"Participants":[138],"consider":[139],"them":[140],"useful,":[141],"show":[144],"intention":[145],"them.":[148],"Contribution":[149],"This":[150],"is":[151],"first":[153],"empirically":[155],"supporting":[156],"ADTs,":[160],"thereby":[161],"contributing":[162],"theory":[165],"requirements":[168],"engineering.":[169]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4394709694","counts_by_year":[],"updated_date":"2024-12-10T00:48:14.587262","created_date":"2024-04-12"}