1.
Schmitt C, Liggesmeyer P. Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources. J. Complex Syst. Inform. Model. Q. 2015;(3):15-34. doi:10.7250/csimq.2015-3.02