References
1. I. Alexander, “Misuse Cases: Use Cases with Hostile Intents”, IEEE Software, pp. 58-66,
(2003).
2. I. Exman, “Misbehavior Discovery through Unified Software-Knowledge Models”, in A.
Fred et al. (eds.), Knowledge Discovery, Knowledge Engineering and Knowledge
Management, 3
rd
Int. Joint Conference, IC3K 2011, Paris, France, October 26-29, Revised
Selected Papers, CCIS Vol. 348, pp. 350-361, Springer-Verlag, Heidelberg, Germany,
(2013).
3. R. Gallant, "Freddy's Dishwasher: Are Statecharts 'Safe' for Stakeholder Evaluation of
Safety-critical Reactive Systems?" Proceedings of the 1
5
th
International Conference of The
Israel Society for Quality, 200
4.
4. L. Goldin, R. Gallant, and I. Exman, Software Proactive Reengineering for System
Resilience to Misuse, in Proceedings of Software Summit, SWSTE 2014, Bar Ilan
University, (2014).
5. L. Goldin and R. Gallant, “Reengineered PFA: An Approach for Reinvention of
Behaviorally-Rich Systems”, In Proc. SKY'2012 Int. Workshop on Software Knowledge,
Barcelona, Spain, October 2012, SciTe Press, Portugal, (2012).
6. D. Harel and H. Kugler, “The Rhapsody Semantics of Statecharts (or, On the Executable
Core of the UML)”, Integration of Software Specification Techniques for Applications in
Engineering, (H. Ehrig et al., eds.), Lecture Notes in Computer Science, Vol. 3147,
Springer-Verlag, Berlin, Germany, pp. 325-354, (2004).
7. P. Hope, G. McGraw and A.I. Anton, “Misuse and Abuse Cases: Getting Past the Positive”,
IEEE Security and Privacy, pp. 32-34 May/June (2004).
8. M.A. Jackson, Software Requirements & Specifications, Addison-Wesley, Boston, MA,
USA, (1996).
9. M.A. Jackson, Problem Frames: Analysing and Structuring Software Development
Problems, Addison-Wesley, Boston, MA, USA, (2001).
10. M.A. Jackson, “The Problem Frames Approach to Software Engineering”, in Proc. APSEC
2007, 14
th
Asia-Pacific Software Engineering Conference, (2007).
11. G. Sindre and A.L. Opdahl, “Eliciting security requirements with misuse cases”,
Requirements Eng. Vol. 10, pp. 34-44, (2005).
12. J. Steven and G. Peterson, “Defining Misuse with The Development Process”, IEEE
Security & Privacy, pp. 81-84, November/December (2006).
13. ISO/IEC 14764:2006, Software Engineering—Software Life Cycle Processes –
Maintenance.
51