ER '02 Proceedings of the 21st International Conference on Conceptual Modeling
Requirements monitoring in dynamic environments
RE '95 Proceedings of the Second IEEE International Symposium on Requirements Engineering
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 07
Requirements elicitation for the design of context-aware applications in a ubiquitous environment
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Modeling Security Requirements Through Ownership, Permission and Delegation
RE '05 Proceedings of the 13th IEEE International Conference on Requirements Engineering
Reverse Engineering Goal Models from Legacy Code
RE '05 Proceedings of the 13th IEEE International Conference on Requirements Engineering
A framework for security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
An Automated Approach for Goal-driven, Specification-based Testing
ASE '06 Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering
Security Requirements Variability for Software Product Lines
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Location-Based Software Modeling and Analysis: Tropos-Based Approach
ER '08 Proceedings of the 27th International Conference on Conceptual Modeling
Bridging the gap: software specification meets intrusion detector
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Monitoring and diagnosing software requirements
Automated Software Engineering
Modeling Domain Variability in Requirements Engineering with Contexts
ER '09 Proceedings of the 28th International Conference on Conceptual Modeling
A goal oriented approach for modeling and analyzing security trade-offs
ER'07 Proceedings of the 26th international conference on Conceptual modeling
M-BPSec: a method for security requirement elicitation from a UML 2.0 business process specification
ER'07 Proceedings of the 2007 conference on Advances in conceptual modeling: foundations and applications
Towards a requirements-driven framework for detecting malicious behavior against software systems
Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research
Hi-index | 0.01 |
Monitoring and diagnosing (M&D) software based on requirement models is a problem that has recently received a lot of attention in field of Requirement Engineering. In this context, Wang et al. [1] propose a M&D framework that uses goal models to diagnose failures in software at different levels of granularity. In this paper we extend Wang's framework to monitor and diagnose malicious attacks. Our extensions include the addition of anti-goals to model attacker intentions, as well as context-based modeling of the domain within which our system operates. The extended framework has been implemented and evaluated through a series of experiments intended to test its scalability.