Authors
Nesrin Hussein, Wentao Wang, Joseph L Nedelec, Xuetao Wei, Nan Niu
Publication date
2016/9/1
Conference
2016 IEEE 24th International Requirements Engineering Conference Workshops (REW)
Pages
98-101
Publisher
IEEE
Description
In this position paper, we present our interdisciplinary research into a unified account of profiling attackers for software-intensive systems. Our work draws on the principles from requirements engineering and criminology. Specifically, we show how a unified crime theory can be adapted to model the attackers and their degree of knowledge about the environment in which the software operates. We illustrate our approach through an example based on i* and data flow modeling, and discuss future research directions indicated by our preliminary results.
Total citations
201620172018201920202021114111
Scholar articles
N Hussein, W Wang, JL Nedelec, X Wei, N Niu - 2016 IEEE 24th International Requirements …, 2016