---
_id: '53811'
abstract:
- lang: eng
  text: Persistent security challenges plague DevOps teams due to a deficiency in
    expertise regarding security tools and methods, as evidenced by frequent security
    incidents. Existing maturity models fail to adequately address the specific needs
    of DevOps teams. In response, this paper proposes "Security Belts," a novel maturity
    model inspired by martial arts ranking systems. This model aims to assist DevOps
    teams in enhancing their security capabilities by providing a structured approach,
    starting with fundamental activities and progressing to more advanced techniques.
    Drawing from the experiences of monitoring 21 teams, the paper presents lessons
    learned and offers actionable advice for refining maturity models tailored to
    software quality improvement.
author:
- first_name: Samira
  full_name: Taaibi, Samira
  id: '55800'
  last_name: Taaibi
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Lars
  full_name: Hermerschmidt, Lars
  last_name: Hermerschmidt
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: Sven
  full_name: Merschjohann, Sven
  id: '11394'
  last_name: Merschjohann
- first_name: Mark
  full_name: Vollmary, Mark
  last_name: Vollmary
citation:
  ama: 'Taaibi S, Dziwok S, Hermerschmidt L, Koch T, Merschjohann S, Vollmary M. Security
    Belts: A Maturity Model for DevOps Teams to Increase the Software Security of
    their Product - An Experience Report.'
  apa: 'Taaibi, S., Dziwok, S., Hermerschmidt, L., Koch, T., Merschjohann, S., &#38;
    Vollmary, M. (n.d.). <i>Security Belts: A Maturity Model for DevOps Teams to Increase
    the Software Security of their Product - An Experience Report</i>.  30th Americas
    Conference on Information Systems, Salt Lake City.'
  bibtex: '@inproceedings{Taaibi_Dziwok_Hermerschmidt_Koch_Merschjohann_Vollmary,
    title={Security Belts: A Maturity Model for DevOps Teams to Increase the Software
    Security of their Product - An Experience Report}, author={Taaibi, Samira and
    Dziwok, Stefan and Hermerschmidt, Lars and Koch, Thorsten and Merschjohann, Sven
    and Vollmary, Mark} }'
  chicago: 'Taaibi, Samira, Stefan Dziwok, Lars Hermerschmidt, Thorsten Koch, Sven
    Merschjohann, and Mark Vollmary. “Security Belts: A Maturity Model for DevOps
    Teams to Increase the Software Security of Their Product - An Experience Report,”
    n.d.'
  ieee: 'S. Taaibi, S. Dziwok, L. Hermerschmidt, T. Koch, S. Merschjohann, and M.
    Vollmary, “Security Belts: A Maturity Model for DevOps Teams to Increase the Software
    Security of their Product - An Experience Report,” presented at the  30th Americas
    Conference on Information Systems, Salt Lake City.'
  mla: 'Taaibi, Samira, et al. <i>Security Belts: A Maturity Model for DevOps Teams
    to Increase the Software Security of Their Product - An Experience Report</i>.'
  short: 'S. Taaibi, S. Dziwok, L. Hermerschmidt, T. Koch, S. Merschjohann, M. Vollmary,
    in: n.d.'
conference:
  end_date: 2024-08-17
  location: Salt Lake City
  name: ' 30th Americas Conference on Information Systems'
  start_date: 2024-08-15
date_created: 2024-05-02T08:57:52Z
date_updated: 2024-08-09T08:55:49Z
ddc:
- '000'
department:
- _id: '662'
file:
- access_level: closed
  content_type: application/pdf
  creator: staaibi
  date_created: 2024-05-02T08:54:21Z
  date_updated: 2024-05-02T08:54:21Z
  file_id: '53812'
  file_name: AMCIS2024_final_submission_maturity model security belt paper.pdf
  file_size: 540990
  relation: main_file
  success: 1
file_date_updated: 2024-05-02T08:54:21Z
has_accepted_license: '1'
keyword:
- Software security
- maturity model
language:
- iso: eng
publication_status: accepted
status: public
title: 'Security Belts: A Maturity Model for DevOps Teams to Increase the Software
  Security of their Product - An Experience Report'
type: conference
user_id: '55800'
year: '2024'
...
---
_id: '43395'
author:
- first_name: Roman
  full_name: Trentinaglia, Roman
  id: '49934'
  last_name: Trentinaglia
  orcid: 0000-0001-9728-4991
- first_name: Sven
  full_name: Merschjohann, Sven
  id: '11394'
  last_name: Merschjohann
- first_name: Markus
  full_name: Fockel, Markus
  id: '8472'
  last_name: Fockel
  orcid: 0000-0002-1269-0702
- first_name: Hendrik
  full_name: Eikerling, Hendrik
  id: '29279'
  last_name: Eikerling
citation:
  ama: 'Trentinaglia R, Merschjohann S, Fockel M, Eikerling H. Eliciting Security
    Requirements – An Experience Report. In: <i>REFSQ 2023: Requirements Engineering:
    Foundation for Software Quality</i>. Springer Nature Switzerland; 2023. doi:<a
    href="https://doi.org/10.1007/978-3-031-29786-1_25">10.1007/978-3-031-29786-1_25</a>'
  apa: 'Trentinaglia, R., Merschjohann, S., Fockel, M., &#38; Eikerling, H. (2023).
    Eliciting Security Requirements – An Experience Report. <i>REFSQ 2023: Requirements
    Engineering: Foundation for Software Quality</i>. <a href="https://doi.org/10.1007/978-3-031-29786-1_25">https://doi.org/10.1007/978-3-031-29786-1_25</a>'
  bibtex: '@inproceedings{Trentinaglia_Merschjohann_Fockel_Eikerling_2023, place={Cham},
    title={Eliciting Security Requirements – An Experience Report}, DOI={<a href="https://doi.org/10.1007/978-3-031-29786-1_25">10.1007/978-3-031-29786-1_25</a>},
    booktitle={REFSQ 2023: Requirements Engineering: Foundation for Software Quality},
    publisher={Springer Nature Switzerland}, author={Trentinaglia, Roman and Merschjohann,
    Sven and Fockel, Markus and Eikerling, Hendrik}, year={2023} }'
  chicago: 'Trentinaglia, Roman, Sven Merschjohann, Markus Fockel, and Hendrik Eikerling.
    “Eliciting Security Requirements – An Experience Report.” In <i>REFSQ 2023: Requirements
    Engineering: Foundation for Software Quality</i>. Cham: Springer Nature Switzerland,
    2023. <a href="https://doi.org/10.1007/978-3-031-29786-1_25">https://doi.org/10.1007/978-3-031-29786-1_25</a>.'
  ieee: 'R. Trentinaglia, S. Merschjohann, M. Fockel, and H. Eikerling, “Eliciting
    Security Requirements – An Experience Report,” 2023, doi: <a href="https://doi.org/10.1007/978-3-031-29786-1_25">10.1007/978-3-031-29786-1_25</a>.'
  mla: 'Trentinaglia, Roman, et al. “Eliciting Security Requirements – An Experience
    Report.” <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>,
    Springer Nature Switzerland, 2023, doi:<a href="https://doi.org/10.1007/978-3-031-29786-1_25">10.1007/978-3-031-29786-1_25</a>.'
  short: 'R. Trentinaglia, S. Merschjohann, M. Fockel, H. Eikerling, in: REFSQ 2023:
    Requirements Engineering: Foundation for Software Quality, Springer Nature Switzerland,
    Cham, 2023.'
date_created: 2023-04-04T12:47:31Z
date_updated: 2023-04-04T12:51:41Z
department:
- _id: '241'
- _id: '662'
doi: 10.1007/978-3-031-29786-1_25
language:
- iso: eng
place: Cham
publication: 'REFSQ 2023: Requirements Engineering: Foundation for Software Quality'
publication_identifier:
  isbn:
  - '9783031297854'
  - '9783031297861'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer Nature Switzerland
status: public
title: Eliciting Security Requirements – An Experience Report
type: conference
user_id: '8472'
year: '2023'
...
---
_id: '33837'
author:
- first_name: Goran
  full_name: Piskachev, Goran
  id: '41936'
  last_name: Piskachev
  orcid: 0000-0003-4424-5838
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: Sven
  full_name: Merschjohann, Sven
  id: '11394'
  last_name: Merschjohann
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Piskachev G, Dziwok S, Koch T, Merschjohann S, Bodden E. How far are German
    companies in improving security through static program analysis tools? Published
    online 2022.
  apa: Piskachev, G., Dziwok, S., Koch, T., Merschjohann, S., &#38; Bodden, E. (2022).
    <i>How far are German companies in improving security through static program analysis
    tools?</i>
  bibtex: '@article{Piskachev_Dziwok_Koch_Merschjohann_Bodden_2022, series={IEEE Secure
    Development Conference (SecDev)}, title={How far are German companies in improving
    security through static program analysis tools?}, author={Piskachev, Goran and
    Dziwok, Stefan and Koch, Thorsten and Merschjohann, Sven and Bodden, Eric}, year={2022},
    collection={IEEE Secure Development Conference (SecDev)} }'
  chicago: Piskachev, Goran, Stefan Dziwok, Thorsten Koch, Sven Merschjohann, and
    Eric Bodden. “How Far Are German Companies in Improving Security through Static
    Program Analysis Tools?” IEEE Secure Development Conference (SecDev), 2022.
  ieee: G. Piskachev, S. Dziwok, T. Koch, S. Merschjohann, and E. Bodden, “How far
    are German companies in improving security through static program analysis tools?”
    2022.
  mla: Piskachev, Goran, et al. <i>How Far Are German Companies in Improving Security
    through Static Program Analysis Tools?</i> 2022.
  short: G. Piskachev, S. Dziwok, T. Koch, S. Merschjohann, E. Bodden, (2022).
date_created: 2022-10-20T12:37:14Z
date_updated: 2022-10-20T12:37:44Z
department:
- _id: '76'
- _id: '662'
language:
- iso: eng
series_title: IEEE Secure Development Conference (SecDev)
status: public
title: How far are German companies in improving security through static program analysis
  tools?
type: conference
user_id: '15249'
year: '2022'
...
---
_id: '23534'
abstract:
- lang: eng
  text: "In recent years, the World Economic Forum has identified software security
    as\r\nthe most significant technological risk to the world's population, as\r\nsoftware-intensive
    systems process critical data and provide critical services.\r\nThis raises the
    question of the extent to which German companies are addressing\r\nsoftware security
    in developing and operating their software products. This\r\npaper reports on
    the results of an extensive study among developers, product\r\nowners, and managers
    to answer this question. Our results show that ensuring\r\nsecurity is a multi-faceted
    challenge for companies, involving low awareness,\r\ninaccurate self-assessment,
    and a lack of competence on the topic of secure\r\nsoftware development among
    all stakeholders. The current situation in software\r\ndevelopment is therefore
    detrimental to the security of software products in\r\nthe medium and long term."
author:
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: Sven
  full_name: Merschjohann, Sven
  id: '11394'
  last_name: Merschjohann
- first_name: Boris
  full_name: Budweg, Boris
  last_name: Budweg
- first_name: Sebastian
  full_name: Leuer, Sebastian
  last_name: Leuer
citation:
  ama: Dziwok S, Koch T, Merschjohann S, Budweg B, Leuer S. AppSecure.nrw Software
    Security Study. <i>arXiv:210811752</i>. 2021.
  apa: Dziwok, S., Koch, T., Merschjohann, S., Budweg, B., &#38; Leuer, S. (2021).
    AppSecure.nrw Software Security Study. <i>ArXiv:2108.11752</i>.
  bibtex: '@article{Dziwok_Koch_Merschjohann_Budweg_Leuer_2021, title={AppSecure.nrw
    Software Security Study}, journal={arXiv:2108.11752}, author={Dziwok, Stefan and
    Koch, Thorsten and Merschjohann, Sven and Budweg, Boris and Leuer, Sebastian},
    year={2021} }'
  chicago: Dziwok, Stefan, Thorsten Koch, Sven Merschjohann, Boris Budweg, and Sebastian
    Leuer. “AppSecure.Nrw Software Security Study.” <i>ArXiv:2108.11752</i>, 2021.
  ieee: S. Dziwok, T. Koch, S. Merschjohann, B. Budweg, and S. Leuer, “AppSecure.nrw
    Software Security Study,” <i>arXiv:2108.11752</i>. 2021.
  mla: Dziwok, Stefan, et al. “AppSecure.Nrw Software Security Study.” <i>ArXiv:2108.11752</i>,
    2021.
  short: S. Dziwok, T. Koch, S. Merschjohann, B. Budweg, S. Leuer, ArXiv:2108.11752
    (2021).
date_created: 2021-08-27T04:57:00Z
date_updated: 2022-01-06T06:55:56Z
department:
- _id: '241'
- _id: '662'
language:
- iso: eng
publication: arXiv:2108.11752
status: public
title: AppSecure.nrw Software Security Study
type: preprint
user_id: '13616'
year: '2021'
...
---
_id: '22805'
author:
- first_name: Markus
  full_name: Fockel, Markus
  id: '8472'
  last_name: Fockel
  orcid: 0000-0002-1269-0702
- first_name: Sven
  full_name: Merschjohann, Sven
  id: '11394'
  last_name: Merschjohann
- first_name: Masud
  full_name: Fazal-Baqaie, Masud
  last_name: Fazal-Baqaie
- first_name: Torsten
  full_name: Förder, Torsten
  last_name: Förder
- first_name: Stefan
  full_name: Hausmann, Stefan
  last_name: Hausmann
- first_name: Boris
  full_name: Waldeck, Boris
  last_name: Waldeck
citation:
  ama: 'Fockel M, Merschjohann S, Fazal-Baqaie M, Förder T, Hausmann S, Waldeck B.
    Designing and Integrating IEC 62443 Compliant Threat Analysis. In: <i>European
    System, Software &#38; Service Process Improvement &#38; Innovation Conference
    (EuroSPI 2019)</i>. Vol 1060. Communications in Computer and Information Science.
    ; 2019. doi:<a href="https://doi.org/10.1007/978-3-030-28005-5_5">10.1007/978-3-030-28005-5_5</a>'
  apa: Fockel, M., Merschjohann, S., Fazal-Baqaie, M., Förder, T., Hausmann, S., &#38;
    Waldeck, B. (2019). Designing and Integrating IEC 62443 Compliant Threat Analysis.
    In <i>European System, Software &#38; Service Process Improvement &#38; Innovation
    Conference (EuroSPI 2019)</i> (Vol. 1060). Edinburgh, UK. <a href="https://doi.org/10.1007/978-3-030-28005-5_5">https://doi.org/10.1007/978-3-030-28005-5_5</a>
  bibtex: '@inproceedings{Fockel_Merschjohann_Fazal-Baqaie_Förder_Hausmann_Waldeck_2019,
    series={Communications in Computer and Information Science}, title={Designing
    and Integrating IEC 62443 Compliant Threat Analysis}, volume={1060}, DOI={<a href="https://doi.org/10.1007/978-3-030-28005-5_5">10.1007/978-3-030-28005-5_5</a>},
    booktitle={European System, Software &#38; Service Process Improvement &#38; Innovation
    Conference (EuroSPI 2019)}, author={Fockel, Markus and Merschjohann, Sven and
    Fazal-Baqaie, Masud and Förder, Torsten and Hausmann, Stefan and Waldeck, Boris},
    year={2019}, collection={Communications in Computer and Information Science} }'
  chicago: Fockel, Markus, Sven Merschjohann, Masud Fazal-Baqaie, Torsten Förder,
    Stefan Hausmann, and Boris Waldeck. “Designing and Integrating IEC 62443 Compliant
    Threat Analysis.” In <i>European System, Software &#38; Service Process Improvement
    &#38; Innovation Conference (EuroSPI 2019)</i>, Vol. 1060. Communications in Computer
    and Information Science, 2019. <a href="https://doi.org/10.1007/978-3-030-28005-5_5">https://doi.org/10.1007/978-3-030-28005-5_5</a>.
  ieee: M. Fockel, S. Merschjohann, M. Fazal-Baqaie, T. Förder, S. Hausmann, and B.
    Waldeck, “Designing and Integrating IEC 62443 Compliant Threat Analysis,” in <i>European
    System, Software &#38; Service Process Improvement &#38; Innovation Conference
    (EuroSPI 2019)</i>, Edinburgh, UK, 2019, vol. 1060.
  mla: Fockel, Markus, et al. “Designing and Integrating IEC 62443 Compliant Threat
    Analysis.” <i>European System, Software &#38; Service Process Improvement &#38;
    Innovation Conference (EuroSPI 2019)</i>, vol. 1060, 2019, doi:<a href="https://doi.org/10.1007/978-3-030-28005-5_5">10.1007/978-3-030-28005-5_5</a>.
  short: 'M. Fockel, S. Merschjohann, M. Fazal-Baqaie, T. Förder, S. Hausmann, B.
    Waldeck, in: European System, Software &#38; Service Process Improvement &#38;
    Innovation Conference (EuroSPI 2019), 2019.'
conference:
  location: Edinburgh, UK
  name: European System, Software & Service Process Improvement & Innovation Conference
    (EuroSPI 2019)
date_created: 2021-07-23T14:09:56Z
date_updated: 2022-01-06T06:55:41Z
department:
- _id: '241'
- _id: '662'
doi: 10.1007/978-3-030-28005-5_5
intvolume: '      1060'
language:
- iso: eng
publication: European System, Software & Service Process Improvement & Innovation
  Conference (EuroSPI 2019)
publication_identifier:
  issn:
  - 1865-0929
  - 1865-0937
publication_status: published
series_title: Communications in Computer and Information Science
status: public
title: Designing and Integrating IEC 62443 Compliant Threat Analysis
type: conference
user_id: '8472'
volume: 1060
year: '2019'
...
---
_id: '21929'
author:
- first_name: Katharina
  full_name: Altemeier, Katharina
  last_name: Altemeier
- first_name: Matthias
  full_name: Becker, Matthias
  last_name: Becker
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: Sven
  full_name: Merschjohann, Sven
  id: '11394'
  last_name: Merschjohann
citation:
  ama: 'Altemeier K, Becker M, Dziwok S, Koch T, Merschjohann S. Was fehlt (bisher)
    um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für sichere
    Apps by Design. In: Mikusz M, ed. <i>Projektmanagement Und Vorgehensmodelle 2019
    (PVM 2019)</i>. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik
    e.V.; 2019.'
  apa: Altemeier, K., Becker, M., Dziwok, S., Koch, T., &#38; Merschjohann, S. (2019).
    Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen
    für sichere Apps by Design. In M. Mikusz (Ed.), <i>Projektmanagement und Vorgehensmodelle
    2019 (PVM 2019)</i>. Gesellschaft für Informatik e.V.
  bibtex: '@inproceedings{Altemeier_Becker_Dziwok_Koch_Merschjohann_2019, series={Lecture
    Notes in Informatics (LNI)}, title={Was fehlt (bisher) um Apps sicher zu entwickeln?
    - Prozesse, Werkzeuge und Schulungen für sichere Apps by Design}, booktitle={Projektmanagement
    und Vorgehensmodelle 2019 (PVM 2019)}, publisher={Gesellschaft für Informatik
    e.V.}, author={Altemeier, Katharina and Becker, Matthias and Dziwok, Stefan and
    Koch, Thorsten and Merschjohann, Sven}, editor={Mikusz, MartinEditor}, year={2019},
    collection={Lecture Notes in Informatics (LNI)} }'
  chicago: Altemeier, Katharina, Matthias Becker, Stefan Dziwok, Thorsten Koch, and
    Sven Merschjohann. “Was Fehlt (Bisher) Um Apps Sicher Zu Entwickeln? - Prozesse,
    Werkzeuge Und Schulungen Für Sichere Apps by Design.” In <i>Projektmanagement
    Und Vorgehensmodelle 2019 (PVM 2019)</i>, edited by Martin Mikusz. Lecture Notes
    in Informatics (LNI). Gesellschaft für Informatik e.V., 2019.
  ieee: K. Altemeier, M. Becker, S. Dziwok, T. Koch, and S. Merschjohann, “Was fehlt
    (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und Schulungen für
    sichere Apps by Design,” in <i>Projektmanagement und Vorgehensmodelle 2019 (PVM
    2019)</i>, 2019.
  mla: Altemeier, Katharina, et al. “Was Fehlt (Bisher) Um Apps Sicher Zu Entwickeln?
    - Prozesse, Werkzeuge Und Schulungen Für Sichere Apps by Design.” <i>Projektmanagement
    Und Vorgehensmodelle 2019 (PVM 2019)</i>, edited by Martin Mikusz, Gesellschaft
    für Informatik e.V., 2019.
  short: 'K. Altemeier, M. Becker, S. Dziwok, T. Koch, S. Merschjohann, in: M. Mikusz
    (Ed.), Projektmanagement Und Vorgehensmodelle 2019 (PVM 2019), Gesellschaft für
    Informatik e.V., 2019.'
date_created: 2021-04-30T10:55:34Z
date_updated: 2022-01-06T06:55:19Z
department:
- _id: '241'
- _id: '662'
editor:
- first_name: Martin
  full_name: Mikusz, Martin
  last_name: Mikusz
language:
- iso: eng
publication: Projektmanagement und Vorgehensmodelle 2019 (PVM 2019)
publisher: Gesellschaft für Informatik e.V.
series_title: Lecture Notes in Informatics (LNI)
status: public
title: Was fehlt (bisher) um Apps sicher zu entwickeln? - Prozesse, Werkzeuge und
  Schulungen für sichere Apps by Design
type: conference
user_id: '13616'
year: '2019'
...
---
_id: '20780'
abstract:
- lang: eng
  text: With the growing number of incidents, the topic security gains more and more
    attention across all domains. Organizations realize their lack of state-of-the-art
    security practices, however, they struggle to improve their software lifecycle
    in terms of security. In this talk, we introduce the concept of security by design
    that implements security practices within the whole software lifecycle. Based
    on our practical experience from industry projects in the regulated industrial
    automation and unregulated classical IT domain, we explain how to perform a threat
    analysis and how to integrate it into the software lifecycle.
author:
- first_name: Markus
  full_name: Fockel, Markus
  id: '8472'
  last_name: Fockel
  orcid: 0000-0002-1269-0702
- first_name: Sven
  full_name: Merschjohann, Sven
  id: '11394'
  last_name: Merschjohann
- first_name: Masud
  full_name: Fazal-Baqaie, Masud
  last_name: Fazal-Baqaie
citation:
  ama: 'Fockel M, Merschjohann S, Fazal-Baqaie M. Threat Analysis in Practice - Systematically
    Deriving Security Requirements. In: <i>19th International Conference on Product-Focused
    Software Process Improvement (PROFES 2018)</i>. LNCS 11271. Springer Nature Switzerland
    AG; 2018. doi:<a href="https://doi.org/10.1007/978-3-030-03673-7_25">10.1007/978-3-030-03673-7_25</a>'
  apa: Fockel, M., Merschjohann, S., &#38; Fazal-Baqaie, M. (2018). Threat Analysis
    in Practice - Systematically Deriving Security Requirements. In <i>19th International
    Conference on Product-Focused Software Process Improvement (PROFES 2018)</i>.
    Springer Nature Switzerland AG. <a href="https://doi.org/10.1007/978-3-030-03673-7_25">https://doi.org/10.1007/978-3-030-03673-7_25</a>
  bibtex: '@inproceedings{Fockel_Merschjohann_Fazal-Baqaie_2018, series={LNCS 11271},
    title={Threat Analysis in Practice - Systematically Deriving Security Requirements},
    DOI={<a href="https://doi.org/10.1007/978-3-030-03673-7_25">10.1007/978-3-030-03673-7_25</a>},
    booktitle={19th International Conference on Product-Focused Software Process Improvement
    (PROFES 2018)}, publisher={Springer Nature Switzerland AG}, author={Fockel, Markus
    and Merschjohann, Sven and Fazal-Baqaie, Masud}, year={2018}, collection={LNCS
    11271} }'
  chicago: Fockel, Markus, Sven Merschjohann, and Masud Fazal-Baqaie. “Threat Analysis
    in Practice - Systematically Deriving Security Requirements.” In <i>19th International
    Conference on Product-Focused Software Process Improvement (PROFES 2018)</i>.
    LNCS 11271. Springer Nature Switzerland AG, 2018. <a href="https://doi.org/10.1007/978-3-030-03673-7_25">https://doi.org/10.1007/978-3-030-03673-7_25</a>.
  ieee: M. Fockel, S. Merschjohann, and M. Fazal-Baqaie, “Threat Analysis in Practice
    - Systematically Deriving Security Requirements,” in <i>19th International Conference
    on Product-Focused Software Process Improvement (PROFES 2018)</i>, 2018.
  mla: Fockel, Markus, et al. “Threat Analysis in Practice - Systematically Deriving
    Security Requirements.” <i>19th International Conference on Product-Focused Software
    Process Improvement (PROFES 2018)</i>, Springer Nature Switzerland AG, 2018, doi:<a
    href="https://doi.org/10.1007/978-3-030-03673-7_25">10.1007/978-3-030-03673-7_25</a>.
  short: 'M. Fockel, S. Merschjohann, M. Fazal-Baqaie, in: 19th International Conference
    on Product-Focused Software Process Improvement (PROFES 2018), Springer Nature
    Switzerland AG, 2018.'
date_created: 2020-12-17T12:00:45Z
date_updated: 2022-01-06T06:54:38Z
department:
- _id: '241'
- _id: '662'
doi: 10.1007/978-3-030-03673-7_25
language:
- iso: eng
publication: 19th International Conference on Product-Focused Software Process Improvement
  (PROFES 2018)
publisher: Springer Nature Switzerland AG
series_title: LNCS 11271
status: public
title: Threat Analysis in Practice - Systematically Deriving Security Requirements
type: conference
user_id: '8472'
year: '2018'
...
