Model-Based Management of Information System Security Risk. Presses universitaires de Namur, 2012. ,
URL : https://hal.archives-ouvertes.fr/tel-00402996
Formalizing information security knowledge, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, 2009. ,
DOI : 10.1145/1533057.1533084
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.9959
Security Requirements Engineering: A Framework for Representation and Analysis, IEEE Transactions on Software Engineering, vol.34, issue.1, pp.133-53, 2008. ,
DOI : 10.1109/TSE.2007.70754
Security Requirements for the Rest of Us: A Survey, IEEE Software, vol.25, issue.1, pp.20-27, 2008. ,
DOI : 10.1109/MS.2008.19
Web application security engineering ». Security & Privacy, IEEE, vol.4, issue.4, pp.16-24, 2006. ,
DOI : 10.1109/msp.2006.109
Specifying Reusable Security Requirements., The Journal of Object Technology, vol.3, issue.1, pp.61-75, 2004. ,
DOI : 10.5381/jot.2004.3.1.c6
Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security, 2011 Sixth International Conference on Availability, Reliability and Security ,
DOI : 10.1109/ARES.2011.81
Using the RITA Threats Ontology to Guide Requirements Elicitation: an Empirical Experiment in the Banking Sector, 2008 First International Workshop on Managing Requirements Knowledge, pp.8-11, 2008. ,
DOI : 10.1109/MARK.2008.11
Using Security and Domain Ontologies for Security Requirements Analysis, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, pp.101-107, 2013. ,
DOI : 10.1109/COMPSACW.2013.124
URL : https://hal.archives-ouvertes.fr/hal-00864300
SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY, International Journal of Software Engineering and Knowledge Engineering, vol.1957, issue.02, pp.285-309, 2007. ,
DOI : 10.1007/3-540-44564-1_1
Comyn-Wattiau I., « Reusable knowledge in security requirements engineering: a systematic mapping study, Requirements Engineering Journal, pp.1-33 ,
« Case study research: Design and methods » ,
La piraterie maritime au début du XXième siecle: panorama, modes opératoires et solutions», 2009. ,
« Modelling Reusable Security Requirements Based on an Ontology Framework, Journal of Research and Practice in Information Technology, vol.41, issue.2, p.119, 2009. ,
Requirements reuse and patterns: a survey Requirements Engineering: Foundation for Software Quality, pp.301-308, 2014. ,
Using Domain Ontology as Domain Knowledge for Requirements Elicitation, 14th IEEE International Requirements Engineering Conference (RE'06), pp.189-98, 2006. ,
DOI : 10.1109/RE.2006.72
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.485.6475
DODT: Increasing requirements formalism using domain ontologies for improved embedded systems development, 14th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems, pp.271-274, 2011. ,
DOI : 10.1109/DDECS.2011.5783092
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.384.5127
Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems, Product-Focused Software Process Improvement, pp.239-253, 2014. ,
DOI : 10.1007/978-3-319-13835-0_17
A Taxonomy of Evaluation Methods for Information Systems Artifacts, Journal of Management Information Systems, vol.17, issue.5, pp.229-267, 2015. ,
DOI : 10.1109/21.135678
URL : https://hal.archives-ouvertes.fr/hal-01272048
Towards a new generation of security requirements definition methodology using ontologies, CAiSE, pp.1-8, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00710425
A knowledge reuse based approach for domain specific security requirements engineering. 2015. Dissertation ,
URL : https://hal.archives-ouvertes.fr/tel-01302760
Secure software systems engineering: The Secure Tropos approach. JSW, pp.331-340, 2011. ,
DOI : 10.4018/978-1-61520-837-1
Maritime Cyber Attacks: Changing Tides. Last modified, 2015. ,
Hacking Ships: Maritime Shipping Industry at Risk. Last modified, 2015. ,
The future of maritime cyber security, 2015. ,
Towards a Systemic Approach for Information Security Risk Management, 2016 11th International Conference on Availability, Reliability and Security (ARES) ,
DOI : 10.1109/ARES.2016.76
Soft Systems Methodology in Action, 1990. ,
A Comprehensive Framework for Evaluation in Design Science Research, Proceedings of the Seventh International Conference on Design Science Research in Information Systems and Technology, pp.423-438, 2012. ,
DOI : 10.1007/978-3-642-29863-9_31
Positioning and presenting design science research for maximum impact, MIS Quarterly, vol.37, issue.2, pp.337-355, 2013. ,
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, vol.13, issue.3, pp.319-340, 1989. ,
DOI : 10.2307/249008
R??le of Domain Engineering in Software Development???Why Current Requirements Engineering Is Flawed??!, Perspectives of Systems Informatics, 2010. ,
DOI : 10.1007/978-3-642-11486-1_2
Using Domain Ontology as Domain Knowledge for Requirements Elicitation, 14th IEEE International Requirements Engineering Conference (RE'06), pp.189-98, 2006. ,
DOI : 10.1109/RE.2006.72
Specifying Reusable Security Requirements., The Journal of Object Technology, vol.3, issue.1, pp.61-75, 2004. ,
DOI : 10.5381/jot.2004.3.1.c6
A Design Science Research Methodology for Information Systems Research, Journal of Management Information Systems, vol.24, issue.3, pp.45-77, 2007. ,
DOI : 10.2753/MIS0742-1222240302
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.535.7773
Ontologies for Security Requirements: A Literature Survey and Classification, Advanced Information Systems Engineering Workshops, pp.61-69, 2012. ,
DOI : 10.1007/978-3-642-31069-0_5
URL : https://hal.archives-ouvertes.fr/hal-00709229
Building theories from case study research Academy of management review, pp.532-550, 1989. ,