N. Mayer, Model-Based Management of Information System Security Risk. Presses universitaires de Namur, 2012.
URL : https://hal.archives-ouvertes.fr/tel-00402996

S. Fenz and A. Ekelhart, Formalizing information security knowledge, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, 2009.
DOI : 10.1145/1533057.1533084

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.9959

C. B. Haley, R. Laney, J. D. Moffett, and N. B. , Security Requirements Engineering: A Framework for Representation and Analysis, IEEE Transactions on Software Engineering, vol.34, issue.1, pp.133-53, 2008.
DOI : 10.1109/TSE.2007.70754

I. A. Tondel, M. G. Jaatun, and M. P. , Security Requirements for the Rest of Us: A Survey, IEEE Software, vol.25, issue.1, pp.20-27, 2008.
DOI : 10.1109/MS.2008.19

J. D. Meier, Web application security engineering ». Security & Privacy, IEEE, vol.4, issue.4, pp.16-24, 2006.
DOI : 10.1109/msp.2006.109

D. G. Firesmith, Specifying Reusable Security Requirements., The Journal of Object Technology, vol.3, issue.1, pp.61-75, 2004.
DOI : 10.5381/jot.2004.3.1.c6

A. Zuccato, N. Daniels, and C. Jampathom, Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security, 2011 Sixth International Conference on Availability, Reliability and Security
DOI : 10.1109/ARES.2011.81

C. Salinesi, E. Ivankina, and W. Angole, Using the RITA Threats Ontology to Guide Requirements Elicitation: an Empirical Experiment in the Banking Sector, 2008 First International Workshop on Managing Requirements Knowledge, pp.8-11, 2008.
DOI : 10.1109/MARK.2008.11

A. Souag, C. Salinesi, I. Comyn-wattiau, and H. Mouratidis, Using Security and Domain Ontologies for Security Requirements Analysis, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, pp.101-107, 2013.
DOI : 10.1109/COMPSACW.2013.124

URL : https://hal.archives-ouvertes.fr/hal-00864300

H. Mouratidis and P. Giorgini, SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY, International Journal of Software Engineering and Knowledge Engineering, vol.1957, issue.02, pp.285-309, 2007.
DOI : 10.1007/3-540-44564-1_1

A. Souag, R. Mazo, and C. Salinesi, Comyn-Wattiau I., « Reusable knowledge in security requirements engineering: a systematic mapping study, Requirements Engineering Journal, pp.1-33

R. K. Yin, « Case study research: Design and methods »

A. S. Chebli, La piraterie maritime au début du XXième siecle: panorama, modes opératoires et solutions», 2009.

J. L. Velasco, R. Valencia-garcia, J. T. Fernandez-breis, and A. Toval, « Modelling Reusable Security Requirements Based on an Ontology Framework, Journal of Research and Practice in Information Technology, vol.41, issue.2, p.119, 2009.

C. Palomares, X. Franch, and C. Quer, Requirements reuse and patterns: a survey Requirements Engineering: Foundation for Software Quality, pp.301-308, 2014.

H. Kaiya and M. Saeki, Using Domain Ontology as Domain Knowledge for Requirements Elicitation, 14th IEEE International Requirements Engineering Conference (RE'06), pp.189-98, 2006.
DOI : 10.1109/RE.2006.72

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.485.6475

S. Farfeleder, T. Moser, A. Krall, T. Stålhane, H. Zojer et al., DODT: Increasing requirements formalism using domain ontologies for improved embedded systems development, 14th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems, pp.271-274, 2011.
DOI : 10.1109/DDECS.2011.5783092

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.384.5127

T. Ruhroth, S. Gärtner, J. Bürger, J. Jürjens, and K. Schneider, Towards Adaptation and Evolution of Domain-Specific Knowledge for Maintaining Secure Systems, Product-Focused Software Process Improvement, pp.239-253, 2014.
DOI : 10.1007/978-3-319-13835-0_17

N. Prat, I. Comyn-wattiau, and J. Akoka, A Taxonomy of Evaluation Methods for Information Systems Artifacts, Journal of Management Information Systems, vol.17, issue.5, pp.229-267, 2015.
DOI : 10.1109/21.135678

URL : https://hal.archives-ouvertes.fr/hal-01272048

A. Souag, Towards a new generation of security requirements definition methodology using ontologies, CAiSE, pp.1-8, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00710425

A. Souag and . Aman-da, A knowledge reuse based approach for domain specific security requirements engineering. 2015. Dissertation
URL : https://hal.archives-ouvertes.fr/tel-01302760

H. Mouratidis, Secure software systems engineering: The Secure Tropos approach. JSW, pp.331-340, 2011.
DOI : 10.4018/978-1-61520-837-1

B. Belmont-kate, Maritime Cyber Attacks: Changing Tides. Last modified, 2015.

P. Pierluigi, Hacking Ships: Maritime Shipping Industry at Risk. Last modified, 2015.

O. Fitton, D. Prince, B. Germond, and M. Lacy, The future of maritime cyber security, 2015.

Y. Naudet, N. Mayer, and C. Feltus, Towards a Systemic Approach for Information Security Risk Management, 2016 11th International Conference on Availability, Reliability and Security (ARES)
DOI : 10.1109/ARES.2016.76

P. Checkland and J. Scholes, Soft Systems Methodology in Action, 1990.

J. Venable, J. Pries-heje, and R. Baskerville, A Comprehensive Framework for Evaluation in Design Science Research, Proceedings of the Seventh International Conference on Design Science Research in Information Systems and Technology, pp.423-438, 2012.
DOI : 10.1007/978-3-642-29863-9_31

S. Gregor and A. Hevner, Positioning and presenting design science research for maximum impact, MIS Quarterly, vol.37, issue.2, pp.337-355, 2013.

F. Davis, Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, vol.13, issue.3, pp.319-340, 1989.
DOI : 10.2307/249008

D. Bjørner, R??le of Domain Engineering in Software Development???Why Current Requirements Engineering Is Flawed??!, Perspectives of Systems Informatics, 2010.
DOI : 10.1007/978-3-642-11486-1_2

H. Kaiya and M. Saeki, Using Domain Ontology as Domain Knowledge for Requirements Elicitation, 14th IEEE International Requirements Engineering Conference (RE'06), pp.189-98, 2006.
DOI : 10.1109/RE.2006.72

D. Firesmith, Specifying Reusable Security Requirements., The Journal of Object Technology, vol.3, issue.1, pp.61-75, 2004.
DOI : 10.5381/jot.2004.3.1.c6

K. Peffers, T. Tuunanen, M. A. Rothenberger, and S. Chatterjee, A Design Science Research Methodology for Information Systems Research, Journal of Management Information Systems, vol.24, issue.3, pp.45-77, 2007.
DOI : 10.2753/MIS0742-1222240302

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.535.7773

A. Souag, C. Salinesi, and I. Comyn-wattiau, Ontologies for Security Requirements: A Literature Survey and Classification, Advanced Information Systems Engineering Workshops, pp.61-69, 2012.
DOI : 10.1007/978-3-642-31069-0_5

URL : https://hal.archives-ouvertes.fr/hal-00709229

K. M. Eisenhardt, Building theories from case study research Academy of management review, pp.532-550, 1989.