[1]
Schmitt, C. and Liggesmeyer, P. 2015. Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources. Complex Systems Informatics and Modeling Quarterly. 3 (Aug. 2015), 15–34. DOI:https://doi.org/10.7250/csimq.2015-3.02.