{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:49:50Z","timestamp":1761630590095,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/ssiri.2011.11","type":"proceedings-article","created":{"date-parts":[[2011,8,25]],"date-time":"2011-08-25T12:04:21Z","timestamp":1314273861000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts"],"prefix":"10.1109","author":[{"given":"Omar El","family":"Ariss","sequence":"first","affiliation":[]},{"given":"Jianfei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Dianxiang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/1509297.1509300"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1007\/b11930","author":"schumacher","year":"2003","journal-title":"Security Engineering with Patterns Origins Theoretical Models and New Applications"},{"key":"18","article-title":"Using parameterized UML to specify and compose access control models","author":"ray","year":"2003","journal-title":"Proc of the 6th Conf on Integrity and Internal Control in Information Systems"},{"key":"15","article-title":"Data mining in vulnerability databases","author":"schumacher","year":"2000","journal-title":"7th Workshop \"Sicherheit in Vernetzten Systemen\""},{"year":"2009","journal-title":"Common Criteria for Information Technology Security Evaluation in Version 3 1 Revision 2","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/366173.366183"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/TSE.2006.40"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1504\/IJCAT.2008.017725"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/ICSE.2004.1317437"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1145\/508791.508990"},{"key":"20","article-title":"Enhancing UML to model custom security aspects","author":"pavlich-mariscal","year":"2007","journal-title":"Proc of AOM AOSD"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/COMPSAC.2008.114"},{"key":"23","article-title":"A systematic approach for integrating fault trees into system statecharts","author":"el-ariss","year":"2008","journal-title":"Proc of COMPSAC'08"},{"year":"1981","journal-title":"U S Nuclear Regulatory Commission Fault Tree Handbook","key":"24"},{"key":"25","first-page":"186","article-title":"Foundations of attack trees","volume":"3935","author":"mauw","year":"2005","journal-title":"Information Security and Cryptology - Springer Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1016\/0167-6423(87)90035-9"},{"year":"2003","author":"mcclure","journal-title":"Web Hacking Attacks And Defense","key":"27"},{"key":"3","first-page":"21","article-title":"Attack trees","volume":"24","author":"schneier","year":"1999","journal-title":"Dr Dobb's Journal of Software Tools"},{"year":"2004","author":"swiderski","journal-title":"Threat Modeling","key":"2"},{"key":"10","first-page":"171","article-title":"Threat-driven design and analysis of secure software architectures","volume":"1","author":"xu","year":"2006","journal-title":"Journal of Information Assurance and Security"},{"year":"2006","author":"wysopal","journal-title":"The Art of Software Security Testing Identifying Software Security Flaws","key":"1"},{"key":"7","article-title":"Penetration testing","author":"weissman","year":"1994","journal-title":"Information Security Essays"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.21236\/ADA375846","author":"allen","year":"2000","journal-title":"State of the Practice of Intrusion Detection Technologies"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/356850.356852"},{"year":"2002","author":"viega","journal-title":"Building Secure Software How to Avoid Security Problems the Right Way","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/MS.2003.1159030"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/s007660200016"}],"event":{"name":"2011 International Conference on Secure Software Integration and Reliability Improvement (SSIRI)","start":{"date-parts":[[2011,6,27]]},"location":"Jeju Island, Korea (South)","end":{"date-parts":[[2011,6,29]]}},"container-title":["2011 Fifth International Conference on Secure Software Integration and Reliability Improvement"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5991610\/5991983\/05991998.pdf?arnumber=5991998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T08:00:01Z","timestamp":1560499201000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5991998\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ssiri.2011.11","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}