{"id":"https://openalex.org/W3011547193","doi":"https://doi.org/10.1155/2020/5137625","title":"Integrating Security Requirements Engineering into MBSE: Profile and Guidelines","display_name":"Integrating Security Requirements Engineering into MBSE: Profile and Guidelines","publication_year":2020,"publication_date":"2020-03-12","ids":{"openalex":"https://openalex.org/W3011547193","doi":"https://doi.org/10.1155/2020/5137625","mag":"3011547193"},"language":"en","primary_location":{"id":"doi:10.1155/2020/5137625","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/5137625","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/5137625.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/5137625.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030291613","display_name":"Donatas Ma\u017eeika","orcid":"https://orcid.org/0000-0003-1595-3472"},"institutions":[{"id":"https://openalex.org/I172574986","display_name":"Kaunas University of Technology","ror":"https://ror.org/01me6gb93","country_code":"LT","type":"education","lineage":["https://openalex.org/I172574986"]}],"countries":["LT"],"is_corresponding":true,"raw_author_name":"D. Ma\u017eeika","raw_affiliation_strings":["Centre of Information Systems Design Technology, Kaunas University of Technology, Kaunas, Lithuania"],"affiliations":[{"raw_affiliation_string":"Centre of Information Systems Design Technology, Kaunas University of Technology, Kaunas, Lithuania","institution_ids":["https://openalex.org/I172574986"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029736446","display_name":"Rimantas Butleris","orcid":"https://orcid.org/0000-0001-6396-2483"},"institutions":[{"id":"https://openalex.org/I172574986","display_name":"Kaunas University of Technology","ror":"https://ror.org/01me6gb93","country_code":"LT","type":"education","lineage":["https://openalex.org/I172574986"]}],"countries":["LT"],"is_corresponding":false,"raw_author_name":"R. Butleris","raw_affiliation_strings":["Centre of Information Systems Design Technology, Kaunas University of Technology, Kaunas, Lithuania"],"affiliations":[{"raw_affiliation_string":"Centre of Information Systems Design Technology, Kaunas University of Technology, Kaunas, Lithuania","institution_ids":["https://openalex.org/I172574986"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030291613"],"corresponding_institution_ids":["https://openalex.org/I172574986"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":2.8413,"has_fulltext":true,"cited_by_count":35,"citation_normalized_percentile":{"value":0.92401991,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12000","display_name":"Systems Engineering Methodologies and Applications","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8161886930465698},{"id":"https://openalex.org/keywords/systems-modeling-language","display_name":"Systems Modeling Language","score":0.6648538112640381},{"id":"https://openalex.org/keywords/unified-modeling-language","display_name":"Unified Modeling Language","score":0.6223613619804382},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.45742735266685486},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.40184712409973145},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3348275423049927},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2809586226940155},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.21433353424072266},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.212416410446167},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.2092808485031128},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.08626499772071838}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8161886930465698},{"id":"https://openalex.org/C21285288","wikidata":"https://www.wikidata.org/wiki/Q2117885","display_name":"Systems Modeling Language","level":4,"score":0.6648538112640381},{"id":"https://openalex.org/C145644426","wikidata":"https://www.wikidata.org/wiki/Q169411","display_name":"Unified Modeling Language","level":3,"score":0.6223613619804382},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.45742735266685486},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.40184712409973145},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3348275423049927},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2809586226940155},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.21433353424072266},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.212416410446167},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.2092808485031128},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.08626499772071838},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1155/2020/5137625","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/5137625","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/5137625.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:ktu.edu:elaba:55869748","is_oa":true,"landing_page_url":"https://vb.ktu.edu/KTU:ELABAPDB55869748&prefLang=en_US","pdf_url":null,"source":{"id":"https://openalex.org/S4406922255","display_name":"KTUePubl (Repository of Kaunas University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"eISSN 1939-0122","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:2e506c26dec2479b9c4fe3df10e0e9df","is_oa":true,"landing_page_url":"https://doaj.org/article/2e506c26dec2479b9c4fe3df10e0e9df","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"},{"id":"pmh:oai:elaba:55869748","is_oa":true,"landing_page_url":"https://vb.ktu.edu/KTU:ELABAPDB55869748&amp;prefLang=en_US","pdf_url":null,"source":{"id":"https://openalex.org/S4406922255","display_name":"KTUePubl (Repository of Kaunas University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and communication networks, London : Wiley\u2013Hindawi, 2020, vol. 2020, art. no. 5137625, p. 1-12","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1155/2020/5137625","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/5137625","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/5137625.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3011547193.pdf","grobid_xml":"https://content.openalex.org/works/W3011547193.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W1988225931","https://openalex.org/W1992208352","https://openalex.org/W2016064176","https://openalex.org/W2034293242","https://openalex.org/W2057864103","https://openalex.org/W2111695375","https://openalex.org/W2552079288","https://openalex.org/W4248069997"],"related_works":["https://openalex.org/W2170113317","https://openalex.org/W2009258791","https://openalex.org/W2135253840","https://openalex.org/W3149751866","https://openalex.org/W2170871060","https://openalex.org/W1984712372","https://openalex.org/W2141291477","https://openalex.org/W2062302515","https://openalex.org/W2139959881","https://openalex.org/W4244804067"],"abstract_inverted_index":{"Model-Based":[0],"System":[1],"Engineering":[2],"(MBSE)":[3],"provides":[4,93],"a":[5,72],"number":[6],"of":[7,58,143],"ways":[8],"on":[9],"how":[10],"to":[11,115,124],"create,":[12],"validate,":[13],"and":[14,51,66,68,87,90,92,139,148],"verify":[15],"the":[16,21,29,34,55,94,104,116,125,133,140],"complex":[17],"system":[18],"design;":[19],"unfortunately,":[20],"inherent":[22],"security":[23,52,83,96,112,120,127,134,147],"aspects":[24],"are":[25,45],"addressed":[26],"neither":[27],"by":[28,39],"SysML":[30],"language":[31],"that":[32],"is":[33,101],"main":[35],"MBSE":[36,41,50,59,95,126],"enabler":[37],"nor":[38],"popular":[40],"methods.":[42],"Although":[43],"there":[44],"many":[46],"common":[47],"points":[48],"between":[49],"requirements":[53,84],"engineering,":[54],"key":[56],"advantages":[57],"(such":[60],"as":[61,98],"managed":[62],"complexity,":[63],"reduced":[64],"risk":[65],"cost,":[67],"improved":[69],"communication":[70],"across":[71],"multidisciplinary":[73],"team)":[74],"have":[75],"not":[76],"been":[77],"exploited":[78],"enough.":[79],"This":[80],"paper":[81,130],"reviews":[82],"engineering":[85,150],"processes":[86],"modeling":[88],"methods":[89],"standards":[91],"profile":[97,113,135],"well,":[99],"which":[100],"formalized":[102],"with":[103],"UML":[105],"2.5":[106],"profiling":[107],"capability.":[108],"The":[109],"new":[110],"UML-based":[111],"conforms":[114],"ISO/IEC":[117],"27001":[118],"information":[119],"standard.":[121],"In":[122],"addition":[123],"profile,":[128],"this":[129],"also":[131],"presents":[132],"application":[136],"use":[137],"case":[138],"feasibility":[141],"study":[142],"current":[144],"status":[145],"for":[146],"systems":[149],"processes.":[151]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
