1.
Schmitt C, Liggesmeyer P. Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources. J. Complex Syst. Inform. Model. Q. [Internet]. 2015 Aug. 3 [cited 2026 Mar. 7];(3):15-34. Available from: https://csimq-journals.rtu.lv/csimq/article/view/csimq.2015-3.02