Holistic security requirements analysis: An attacker's perspective | IEEE Conference Publication | IEEE Xplore