A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The diversity of currently available security requirement engineering methodol...
Main Authors: | Romain Laborde, Sravani Teja Bulusu, Ahmad Samer Wazan, Arnaud Oglaza, Abdelmalek Benzekri |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-07-01
|
Series: | Journal of Cybersecurity and Privacy |
Subjects: | |
Online Access: | https://www.mdpi.com/2624-800X/1/3/22 |
Similar Items
-
The selenium content of SEPP1 versus selenium requirements in vertebrates
by: Sam Penglase, et al.
Published: (2015-09-01) -
Combining SABSA and Vis4Sec to the Process Framework IdMSecMan to Continuously Improve Identity Management Security in Heterogeneous ICT Infrastructures
by: Daniela Pöhn, et al.
Published: (2023-02-01) -
Formulating Cybersecurity Requirements for Autonomous Ships Using the SQUARE Methodology
by: Jiwoon Yoo, et al.
Published: (2023-05-01) -
Yönetim Anlayışları Ölçeğinin Geliştirilmesi
by: Mehmet Emin Usta
Published: (2017-11-01) -
Iran’s Cyber Capabilities and Assessing Security Standards for Popular Iranian Websites
by: Mohsen Abdollahzadeh Aghbolagh, et al.
Published: (2023-02-01)