{"id":"https://openalex.org/W1974156097","doi":"https://doi.org/10.1007/s00766-014-0208-9","title":"Using security robustness analysis for early-stage validation of functional security requirements","display_name":"Using security robustness analysis for early-stage validation of functional security requirements","publication_year":2014,"publication_date":"2014-08-12","ids":{"openalex":"https://openalex.org/W1974156097","doi":"https://doi.org/10.1007/s00766-014-0208-9","mag":"1974156097"},"language":"en","primary_location":{"id":"doi:10.1007/s00766-014-0208-9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00766-014-0208-9","pdf_url":null,"source":{"id":"https://openalex.org/S207090427","display_name":"Requirements Engineering","issn_l":"0947-3602","issn":["0947-3602","1432-010X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Requirements Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059997860","display_name":"Mohamed El\u2010Attar","orcid":"https://orcid.org/0000-0002-6709-8212"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mohamed El-Attar","raw_affiliation_strings":["Information and Computer Science Department, King Fahd University of Petroleum and Minerals, P.O. Box 5066, Dhahran, 31261, Kingdom of Saudi Arabia","Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Kingdom of Saudi Arabia 31261#TAB#"],"affiliations":[{"raw_affiliation_string":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, P.O. Box 5066, Dhahran, 31261, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Kingdom of Saudi Arabia 31261#TAB#","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090802117","display_name":"Hezam Akram Abdul-Ghani","orcid":null},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hezam Akram Abdul-Ghani","raw_affiliation_strings":["Information and Computer Science Department, King Fahd University of Petroleum and Minerals, P.O. Box 5066, Dhahran, 31261, Kingdom of Saudi Arabia","Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Kingdom of Saudi Arabia 31261#TAB#"],"affiliations":[{"raw_affiliation_string":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, P.O. Box 5066, Dhahran, 31261, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Kingdom of Saudi Arabia 31261#TAB#","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059997860"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2780},"apc_paid":null,"fwci":4.0623,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.93159939,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"21","issue":"1","first_page":"1","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6429534554481506},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.6179330945014954},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.6102432012557983},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5835681557655334},{"id":"https://openalex.org/keywords/requirement","display_name":"Requirement","score":0.5359398126602173},{"id":"https://openalex.org/keywords/non-functional-requirement","display_name":"Non-functional requirement","score":0.5095451474189758},{"id":"https://openalex.org/keywords/non-functional-testing","display_name":"Non-functional testing","score":0.5063413381576538},{"id":"https://openalex.org/keywords/functional-requirement","display_name":"Functional requirement","score":0.4900573492050171},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.4618567228317261},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4515650272369385},{"id":"https://openalex.org/keywords/requirements-engineering","display_name":"Requirements engineering","score":0.44316548109054565},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.41636785864830017},{"id":"https://openalex.org/keywords/requirements-elicitation","display_name":"Requirements elicitation","score":0.41222095489501953},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.37397271394729614},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3207826614379883},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.30444037914276123},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.29841411113739014},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.22993701696395874},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2296489179134369},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2008821964263916},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.19561117887496948},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.15875950455665588}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6429534554481506},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.6179330945014954},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.6102432012557983},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5835681557655334},{"id":"https://openalex.org/C135475081","wikidata":"https://www.wikidata.org/wiki/Q774228","display_name":"Requirement","level":4,"score":0.5359398126602173},{"id":"https://openalex.org/C199747065","wikidata":"https://www.wikidata.org/wiki/Q3254666","display_name":"Non-functional requirement","level":5,"score":0.5095451474189758},{"id":"https://openalex.org/C26336911","wikidata":"https://www.wikidata.org/wiki/Q7048920","display_name":"Non-functional testing","level":5,"score":0.5063413381576538},{"id":"https://openalex.org/C62235348","wikidata":"https://www.wikidata.org/wiki/Q3264234","display_name":"Functional requirement","level":2,"score":0.4900573492050171},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.4618567228317261},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4515650272369385},{"id":"https://openalex.org/C6604083","wikidata":"https://www.wikidata.org/wiki/Q376937","display_name":"Requirements engineering","level":3,"score":0.44316548109054565},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.41636785864830017},{"id":"https://openalex.org/C45384764","wikidata":"https://www.wikidata.org/wiki/Q838667","display_name":"Requirements elicitation","level":4,"score":0.41222095489501953},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.37397271394729614},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3207826614379883},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.30444037914276123},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.29841411113739014},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.22993701696395874},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2296489179134369},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2008821964263916},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.19561117887496948},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.15875950455665588},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s00766-014-0208-9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00766-014-0208-9","pdf_url":null,"source":{"id":"https://openalex.org/S207090427","display_name":"Requirements Engineering","issn_l":"0947-3602","issn":["0947-3602","1432-010X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Requirements Engineering","raw_type":"journal-article"},{"id":"pmh:oai:generic.eprints.org:139166","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401833","display_name":"Research Publication Repository of King Fahd University of Petroleum and Minerals (King Fahd University of Petroleum & Minerals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I134085113","host_organization_name":"King Fahd University of Petroleum and Minerals","host_organization_lineage":["https://openalex.org/I134085113"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Thesis"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1234225","https://openalex.org/W54544099","https://openalex.org/W64141385","https://openalex.org/W89544911","https://openalex.org/W97271769","https://openalex.org/W1483631473","https://openalex.org/W1515084060","https://openalex.org/W1537001026","https://openalex.org/W1567696012","https://openalex.org/W1779567777","https://openalex.org/W1992602600","https://openalex.org/W2002951642","https://openalex.org/W2025618033","https://openalex.org/W2038514025","https://openalex.org/W2047253696","https://openalex.org/W2058893431","https://openalex.org/W2076253536","https://openalex.org/W2089504470","https://openalex.org/W2098019984","https://openalex.org/W2101026121","https://openalex.org/W2102289146","https://openalex.org/W2106696288","https://openalex.org/W2123316933","https://openalex.org/W2129083927","https://openalex.org/W2131743534","https://openalex.org/W2140379659","https://openalex.org/W2160950252","https://openalex.org/W2168191910","https://openalex.org/W2185716028","https://openalex.org/W2360475718","https://openalex.org/W2486178904","https://openalex.org/W2530205400","https://openalex.org/W3161918289","https://openalex.org/W3185403326","https://openalex.org/W4205736829","https://openalex.org/W4229772528","https://openalex.org/W4248313180","https://openalex.org/W4249606274"],"related_works":["https://openalex.org/W2128973668","https://openalex.org/W2625475396","https://openalex.org/W2080089689","https://openalex.org/W4319599578","https://openalex.org/W4385784960","https://openalex.org/W1002355121","https://openalex.org/W2073041332","https://openalex.org/W3153864189","https://openalex.org/W1550223151","https://openalex.org/W1974156097"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
