Misuse Cases + Assets + Security Goals | IEEE Conference Publication | IEEE Xplore