Follow
Sravani Teja Bulusu
Sravani Teja Bulusu
University paul sabatier
Verified email at irit.fr
Title
Cited by
Cited by
Year
Which security requirements engineering methodology should i choose?: Towards a requirements engineering-based evaluation approach
ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri
Proceedings of the 12th International Conference on Availability …, 2017
122017
A Requirements Engineering-Based Approach for Evaluating Security Requirements Engineering Methodologies
ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri
Information Technology-New Generations, 517-525, 2018
102018
A methodological approach to evaluate security requirements engineering methodologies: Application to the IREHDO2 project context
R Laborde, ST Bulusu, AS Wazan, A Oglaza, A Benzekri
Journal of Cybersecurity and Privacy 1 (3), 422-452, 2021
92021
Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies
ST Bulusu, R Laborde, AS Wazan, F Barrere, A Benzekri
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1316-1318, 2018
62018
Describing advanced persistent threats using a multi-agent system approach
ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri
Cyber Security in Networking Conference (CSNet), 2017 1st, 1-3, 2017
62017
Logic-based methodology to help security architects in eliciting high-level network security requirements
R Laborde, ST Bulusu, AS Wazan, F Barrère, A Benzekri
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1610-1619, 2019
52019
Towards the weaving of the characteristics of good security requirements
ST Bulusu, R Laborde, AS Wazan, F Barrère, A Benzekri
International Conference on Risks and Security of Internet and Systems, 60-74, 2016
52016
Network Security Requirements Engineering Methodology
ST Bulusu
Université de Toulouse, Université Toulouse III-Paul Sabatier, 2019
1*2019
A Logic-Based Network Security Zone Modelling Methodology
ST Bulusu, R Laborde, AS Wazan, F Barrère, A BENZEKRI
SECUREWARE2018, 2018
12018
Survey and analysis of DNS infrastructures
G Bonnoron, D Crémilleux, ST Bulusu, X Zhu, G Valadon
CNRS, 2016
12016
IoT Security threats and risk analysis
A Benzekri, R Laborde, A Oglaza, F Barrère, ST Bulusu, A Ferreira, ...
Handbook of Internet of Things, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–11