[1]
C. Schmitt and P. Liggesmeyer, “Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources”, J. Complex Syst. Inform. Model. Q., no. 3, pp. 15–34, Aug. 2015, doi: 10.7250/csimq.2015-3.02.