Which security requirements engineering methodology should i choose?: Towards a requirements engineering-based evaluation approach ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri Proceedings of the 12th International Conference on Availability …, 2017 | 12 | 2017 |
A Requirements Engineering-Based Approach for Evaluating Security Requirements Engineering Methodologies ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri Information Technology-New Generations, 517-525, 2018 | 10 | 2018 |
A methodological approach to evaluate security requirements engineering methodologies: Application to the IREHDO2 project context R Laborde, ST Bulusu, AS Wazan, A Oglaza, A Benzekri Journal of Cybersecurity and Privacy 1 (3), 422-452, 2021 | 7 | 2021 |
Logic-based methodology to help security architects in eliciting high-level network security requirements R Laborde, ST Bulusu, AS Wazan, F Barrère, A Benzekri Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1610-1619, 2019 | 6 | 2019 |
Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies ST Bulusu, R Laborde, AS Wazan, F Barrere, A Benzekri Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1316-1318, 2018 | 6 | 2018 |
Describing advanced persistent threats using a multi-agent system approach ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri Cyber Security in Networking Conference (CSNet), 2017 1st, 1-3, 2017 | 6 | 2017 |
Towards the weaving of the characteristics of good security requirements ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri International Conference on Risks and Security of Internet and Systems, 60-74, 2016 | 5 | 2016 |
Network Security Requirements Engineering Methodology ST Bulusu Université de Toulouse, Université Toulouse III-Paul Sabatier, 2019 | 1* | 2019 |
A Logic-Based Network Security Zone Modelling Methodology ST Bulusu, R Laborde, AS Wazan, F Barrère, A BENZEKRI SECUREWARE2018, 2018 | 1 | 2018 |
Survey and analysis of DNS infrastructures G Bonnoron, D Crémilleux, ST Bulusu, X Zhu, G Valadon CNRS, 2016 | 1 | 2016 |
IoT Security threats and risk analysis A Benzekri, R Laborde, A Oglaza, F Barrère, ST Bulusu, A Ferreira, ... Handbook of Internet of Things, 2021 | | 2021 |