Logic-based Methodology to Help Security Architects in Eliciting High-Level Network Security Requirements (regular paper)
Dans : ACM/SIGAPP Symposium on Applied Computing (SAC 2019), Limassol, Cyprus, 08/04/19-13/04/19, ACM SIGAPP, p. 1610-1619, 2019.
A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies (regular paper)
Dans : International Conference on Information Technology : New Generations (ITNG 2018), Las Vegas, Nevada, USA, 16/04/18-18/04/18, Vol. 738, Springer, Advances in Intelligent Systems & Computing, p. 517-525, 2018.
Applying a Requirement Engineering Based Approach to evaluate the Security Requirements Engineering Methodologies. (short paper)
Dans : ACM Symposium on Applied Computing (SAC 2018), Pau, France, 09/04/18-13/04/18, ACM : Association for Computing Machinery, p. 1316-1318, 2018.
Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach (short paper)
Dans : International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, 29/08/17-01/09/17, ACM : Association for Computing Machinery, p. 1-6, 2017.
Describing Advanced Persistent Threats Using a Multi-agent System Approach (short paper)
Dans : Cyber Security in Networking Conference (CSNet 2017), Rio de Janeiro, 18/10/17-20/10/17, IEEE : Institute of Electrical and Electronics Engineers, p. 1-3, 2017.
Towards the weaving of the characteristics of good security requirements (regular paper)
Dans : International Conference on Risks and Security of Internet and Systems (CRiSIS 2016), Roscoff, France, 05/09/16-07/09/16, Vol. 10158, Springer, LNCS, p. 60-74, mars 2017.