Keyphrases
Vulnerability
100%
Functional Model
100%
Design Level
100%
State Diagram
100%
Attack Tree
100%
Software Security
100%
Computing Environment
50%
World Wide Web
50%
Inconsistency
50%
Dynamic Behavior
50%
Security Threats
50%
Software Quality
50%
Software Developers
50%
System Specification
50%
Functional Behavior
50%
Security Analysis
50%
Security Attacks
50%
Driven Approach
50%
Level Dynamics
50%
Design Errors
50%
Security Concerns
50%
Software Functionality
50%
Transformation Rules
50%
Tree Representation
50%
Threatening Behaviour
50%
Computer Science
Statecharts
100%
security level
100%
Computing Environment
50%
Driven Approach
50%
Software Engineer
50%
Dynamic Behavior
50%
Security Analysis
50%
Security Attack
50%
System Specification
50%
Integrated Model
50%
Transformation Rule
50%
Security Concern
50%
Software Security
50%