(1)
Schmitt, C.; Liggesmeyer, P. Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources. J. Complex Syst. Inform. Model. Q. 2015, No. 3, 15-34. https://doi.org/10.7250/csimq.2015-3.02.