Existing Vulnerability Information in Security Requirements Elicitation | IEEE Conference Publication | IEEE Xplore