BibTeX records: Kristian Beckers

download as .bib file

@inproceedings{DBLP:conf/sofsem/MoyonMBK21,
  author       = {Fabiola Moyon and
                  Daniel M{\'{e}}ndez and
                  Kristian Beckers and
                  Sebastian Klepper},
  editor       = {Tom{\'{a}}s Bures and
                  Riccardo Dondi and
                  Johann Gamper and
                  Giovanna Guerrini and
                  Tomasz Jurdzinski and
                  Claus Pahl and
                  Florian Sikora and
                  Prudence W. H. Wong},
  title        = {Using Process Models to Understand Security Standards},
  booktitle    = {{SOFSEM} 2021: Theory and Practice of Computer Science - 47th International
                  Conference on Current Trends in Theory and Practice of Computer Science,
                  {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12607},
  pages        = {458--471},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-67731-2\_34},
  doi          = {10.1007/978-3-030-67731-2\_34},
  timestamp    = {Sun, 25 Jul 2021 11:44:25 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/MoyonMBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-02100,
  author       = {Tiago Espinha Gasiba and
                  Kristian Beckers and
                  Santiago Suppan and
                  Filip Rezabek},
  title        = {On the Requirements for Serious Games geared towards Software Developers
                  in the Industry},
  journal      = {CoRR},
  volume       = {abs/2101.02100},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.02100},
  eprinttype    = {arXiv},
  eprint       = {2101.02100},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-02100.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-02106,
  author       = {James Barela and
                  Tiago Espinha Gasiba and
                  Santiago Reinhard Suppan and
                  Marc Berges and
                  Kristian Beckers},
  title        = {When Interactive Graphic Storytelling Fails},
  journal      = {CoRR},
  volume       = {abs/2101.02106},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.02106},
  eprinttype    = {arXiv},
  eprint       = {2101.02106},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-02106.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13024,
  author       = {Fabiola Moy{\'{o}}n Constante and
                  Rafael Soares and
                  Maria Pinto{-}Albuquerque and
                  Daniel M{\'{e}}ndez and
                  Kristian Beckers},
  title        = {Integration of Security Standards in DevOps Pipelines: An Industry
                  Case Study},
  journal      = {CoRR},
  volume       = {abs/2105.13024},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13024},
  eprinttype    = {arXiv},
  eprint       = {2105.13024},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13404,
  author       = {Fabiola Moy{\'{o}}n and
                  Daniel M{\'{e}}ndez Fern{\'{a}}ndez and
                  Kristian Beckers and
                  Sebastian Klepper},
  title        = {How to Integrate Security Compliance Requirements with Agile Software
                  Engineering at Scale?},
  journal      = {CoRR},
  volume       = {abs/2105.13404},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13404},
  eprinttype    = {arXiv},
  eprint       = {2105.13404},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13404.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13413,
  author       = {Fabiola Moy{\'{o}}n and
                  Daniel M{\'{e}}ndez and
                  Kristian Beckers and
                  Sebastian Klepper},
  title        = {Using Process Models to understand Security Standards},
  journal      = {CoRR},
  volume       = {abs/2105.13413},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13413},
  eprinttype    = {arXiv},
  eprint       = {2105.13413},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13413.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/espre-ws/BeckersKLY20,
  author       = {Kristian Beckers and
                  Duncan Ki{-}Aries and
                  Seok{-}Won Lee and
                  Yijun Yu},
  title        = {Welcome from the {ESPRE} 2020 Organisers},
  booktitle    = {7th {IEEE} International Workshop on Evolving Security {\&} Privacy
                  Requirements Engineering, ESPRE@RE 2020, Zurich, Switzerland, August
                  31, 2020},
  pages        = {vi},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ESPRE51200.2020.00005},
  doi          = {10.1109/ESPRE51200.2020.00005},
  timestamp    = {Tue, 20 Oct 2020 15:13:41 +0200},
  biburl       = {https://dblp.org/rec/conf/espre-ws/BeckersKLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mstec/PapeGQB20,
  author       = {Sebastian Pape and
                  Ludger Goeke and
                  Alejandro Quintanar and
                  Kristian Beckers},
  editor       = {George Hatzivasilis and
                  Sotiris Ioannidis},
  title        = {Conceptualization of a CyberSecurity Awareness Quiz},
  booktitle    = {Model-driven Simulation and Training Environments for Cybersecurity
                  - Second International Workshop, {MSTEC} 2020, Guildford, UK, September
                  14-18, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12512},
  pages        = {61--76},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62433-0\_4},
  doi          = {10.1007/978-3-030-62433-0\_4},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mstec/PapeGQB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/profes/MoyonMBK20,
  author       = {Fabiola Moyon and
                  Daniel M{\'{e}}ndez and
                  Kristian Beckers and
                  Sebastian Klepper},
  editor       = {Maurizio Morisio and
                  Marco Torchiano and
                  Andreas Jedlitschka},
  title        = {How to Integrate Security Compliance Requirements with Agile Software
                  Engineering at Scale?},
  booktitle    = {Product-Focused Software Process Improvement - 21st International
                  Conference, {PROFES} 2020, Turin, Italy, November 25-27, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12562},
  pages        = {69--87},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64148-1\_5},
  doi          = {10.1007/978-3-030-64148-1\_5},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/profes/MoyonMBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/profes/MoyonSPMB20,
  author       = {Fabiola Moyon and
                  Rafael Soares and
                  Maria Pinto{-}Albuquerque and
                  Daniel M{\'{e}}ndez and
                  Kristian Beckers},
  editor       = {Maurizio Morisio and
                  Marco Torchiano and
                  Andreas Jedlitschka},
  title        = {Integration of Security Standards in DevOps Pipelines: An Industry
                  Case Study},
  booktitle    = {Product-Focused Software Process Improvement - 21st International
                  Conference, {PROFES} 2020, Turin, Italy, November 25-27, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12562},
  pages        = {434--452},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64148-1\_27},
  doi          = {10.1007/978-3-030-64148-1\_27},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/profes/MoyonSPMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/ConstanteBFDB20,
  author       = {Fabiola Moy{\'{o}}n Constante and
                  Christoph Bayr and
                  Daniel M{\'{e}}ndez Fern{\'{a}}ndez and
                  Sebastian D{\"{a}}nnart and
                  Kristian Beckers},
  editor       = {Alexander Chatzigeorgiou and
                  Riccardo Dondi and
                  Herodotos Herodotou and
                  Christos A. Kapoutsis and
                  Yannis Manolopoulos and
                  George A. Papadopoulos and
                  Florian Sikora},
  title        = {A Light-Weight Tool for the Self-assessment of Security Compliance
                  in Software Development - An Industry Case},
  booktitle    = {{SOFSEM} 2020: Theory and Practice of Computer Science - 46th International
                  Conference on Current Trends in Theory and Practice of Informatics,
                  {SOFSEM} 2020, Limassol, Cyprus, January 20-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12011},
  pages        = {403--416},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38919-2\_33},
  doi          = {10.1007/978-3-030-38919-2\_33},
  timestamp    = {Fri, 07 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sofsem/ConstanteBFDB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/DannartCB19,
  author       = {Sebastian D{\"{a}}nnart and
                  Fabiola Moy{\'{o}}n Constante and
                  Kristian Beckers},
  editor       = {Paolo Giorgini and
                  Barbara Weber},
  title        = {An Assessment Model for Continuous Security Compliance in Large Scale
                  Agile Environments - Exploratory Paper},
  booktitle    = {Advanced Information Systems Engineering - 31st International Conference,
                  CAiSE 2019, Rome, Italy, June 3-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11483},
  pages        = {529--544},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21290-2\_33},
  doi          = {10.1007/978-3-030-21290-2\_33},
  timestamp    = {Wed, 29 May 2019 12:15:56 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/DannartCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GoekeQBP19,
  author       = {Ludger Goeke and
                  Alejandro Quintanar and
                  Kristian Beckers and
                  Sebastian Pape},
  editor       = {Apostolos P. Fournaris and
                  Manos Athanatos and
                  Konstantinos Lampropoulos and
                  Sotiris Ioannidis and
                  George Hatzivasilis and
                  Ernesto Damiani and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Alberto Siena and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {{PROTECT} - An Easy Configurable Serious Game to Train Employees Against
                  Social Engineering Attacks},
  booktitle    = {Computer Security - {ESORICS} 2019 International Workshops, IOSec,
                  MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11981},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42051-2\_11},
  doi          = {10.1007/978-3-030-42051-2\_11},
  timestamp    = {Mon, 03 Jan 2022 22:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GoekeQBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SoultatosFSKDBW19,
  author       = {Othonas Soultatos and
                  Konstantinos Fysarakis and
                  George Spanoudakis and
                  Hristo Koshutanski and
                  Ernesto Damiani and
                  Kristian Beckers and
                  Dirk Wortmann and
                  George Bravos and
                  Menelaos Ioannidis},
  editor       = {Apostolos P. Fournaris and
                  Manos Athanatos and
                  Konstantinos Lampropoulos and
                  Sotiris Ioannidis and
                  George Hatzivasilis and
                  Ernesto Damiani and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Alberto Siena and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {The {THREAT-ARREST} Cyber-Security Training Platform},
  booktitle    = {Computer Security - {ESORICS} 2019 International Workshops, IOSec,
                  MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11981},
  pages        = {199--214},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42051-2\_14},
  doi          = {10.1007/978-3-030-42051-2\_14},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SoultatosFSKDBW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BeckersKLM19,
  author       = {Kristian Beckers and
                  Duncan Ki{-}Aries and
                  Seok{-}Won Lee and
                  Nancy Mead},
  title        = {Preface Sixth International Workshop on Evolving Security and Privacy
                  Requirements Engineering (ESPRE'19)},
  booktitle    = {27th {IEEE} International Requirements Engineering Conference Workshops,
                  {RE} 2019 Workshops, Jeju Island, Korea (South), September 23-27,
                  2019},
  pages        = {133},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/REW.2019.00028},
  doi          = {10.1109/REW.2019.00028},
  timestamp    = {Tue, 07 Jan 2020 13:48:59 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BeckersKLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BarelaGSBB19,
  author       = {James Barela and
                  Tiago Espinha Gasiba and
                  Santiago Reinhard Suppan and
                  Marc Berges and
                  Kristian Beckers},
  title        = {When Interactive Graphic Storytelling Fails},
  booktitle    = {27th {IEEE} International Requirements Engineering Conference Workshops,
                  {RE} 2019 Workshops, Jeju Island, Korea (South), September 23-27,
                  2019},
  pages        = {164--169},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/REW.2019.00034},
  doi          = {10.1109/REW.2019.00034},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/BarelaGSBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GasibaBSR19,
  author       = {Tiago Espinha Gasiba and
                  Kristian Beckers and
                  Santiago Suppan and
                  Filip Rezabek},
  editor       = {Daniela E. Damian and
                  Anna Perini and
                  Seok{-}Won Lee},
  title        = {On the Requirements for Serious Games Geared Towards Software Developers
                  in the Industry},
  booktitle    = {27th {IEEE} International Requirements Engineering Conference, {RE}
                  2019, Jeju Island, Korea (South), September 23-27, 2019},
  pages        = {286--296},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/RE.2019.00038},
  doi          = {10.1109/RE.2019.00038},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/GasibaBSR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AllodiBFB18,
  author       = {Luca Allodi and
                  Sebastian Banescu and
                  Henning Femmer and
                  Kristian Beckers},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {Identifying Relevant Information Cues for Vulnerability Assessment
                  Using {CVSS}},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {119--126},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176340},
  doi          = {10.1145/3176258.3176340},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AllodiBFB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/MoyonBKLB18,
  author       = {Fabiola Moyon and
                  Kristian Beckers and
                  Sebastian Klepper and
                  Philipp Lachberger and
                  Bernd Bruegge},
  editor       = {Jan Bosch and
                  Brian Fitzgerald and
                  Michael Goedicke and
                  Helena Holmstr{\"{o}}m Olsson and
                  Marco Konersmann and
                  Stephan Krusche},
  title        = {Towards continuous security compliance in agile software development
                  at scale},
  booktitle    = {Proceedings of the 4th International Workshop on Rapid Continuous
                  Software Engineering, RCoSE@ICSE 2018, Gothenburg, Sweden, May 29,
                  2018},
  pages        = {31--34},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3194760.3194767},
  doi          = {10.1145/3194760.3194767},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/MoyonBKLB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/MaidlKCB18,
  author       = {Monika Maidl and
                  Dirk Kr{\"{o}}selberg and
                  Jochen Christ and
                  Kristian Beckers},
  editor       = {Sudipto Ghosh and
                  Roberto Natella and
                  Bojan Cukic and
                  Robin S. Poston and
                  Nuno Laranjeiro},
  title        = {A Comprehensive Framework for Security in Engineering Projects - Based
                  on {IEC} 62443},
  booktitle    = {2018 {IEEE} International Symposium on Software Reliability Engineering
                  Workshops, {ISSRE} Workshops, Memphis, TN, USA, October 15-18, 2018},
  pages        = {42--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISSREW.2018.00-33},
  doi          = {10.1109/ISSREW.2018.00-33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/MaidlKCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/AladawyB018,
  author       = {Dina Aladawy and
                  Kristian Beckers and
                  Sebastian Pape},
  editor       = {Steven Furnell and
                  Haralambos Mouratidis and
                  G{\"{u}}nther Pernul},
  title        = {{PERSUADED:} Fighting Social Engineering Attacks with a Serious Game},
  booktitle    = {Trust, Privacy and Security in Digital Business - 15th International
                  Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11033},
  pages        = {103--118},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98385-1\_8},
  doi          = {10.1007/978-3-319-98385-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/AladawyB018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/re/2018espre,
  editor       = {Kristian Beckers and
                  Shamal Faily and
                  Seok{-}Won Lee and
                  Nancy R. Mead},
  title        = {5th {IEEE} International Workshop on Evolving Security {\&} Privacy
                  Requirements Engineering, ESPRE@RE 2018, Banff, AB, Canada, August
                  20, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8500722/proceeding},
  isbn         = {978-1-5386-8420-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/2018espre.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-07648,
  author       = {Luca Allodi and
                  Sebastian Banescu and
                  Henning Femmer and
                  Kristian Beckers},
  title        = {Identifying Relevant Information Cues for Vulnerability Assessment
                  Using {CVSS}},
  journal      = {CoRR},
  volume       = {abs/1803.07648},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.07648},
  eprinttype    = {arXiv},
  eprint       = {1803.07648},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-07648.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SchaabBP17,
  author       = {Peter Schaab and
                  Kristian Beckers and
                  Sebastian Pape},
  title        = {Social engineering defence mechanisms and counteracting training strategies},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {206--222},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-04-2017-0022},
  doi          = {10.1108/ICS-04-2017-0022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SchaabBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/AminiBBBCCFHHKK17,
  author       = {Sasan Amini and
                  Kristian Beckers and
                  Markus B{\"{o}}hm and
                  Fritz Busch and
                  Nihan Celikkaya and
                  Vittorio Cozzolino and
                  Anne Faber and
                  Michael Haus and
                  Dominik Huth and
                  Alfons Kemper and
                  Andreas Kipf and
                  Helmut Krcmar and
                  Florian Matthes and
                  J{\"{o}}rg Ott and
                  Christian Prehofer and
                  Alexander Pretschner and
                  {\"{O}}mer Uludag and
                  Wolfgang W{\"{o}}rndl},
  title        = {Informatikforschung f{\"{u}}r digitale Mobilit{\"{a}}tsplattformen
                  - Am Beispiel des {TUM} Living Lab Connected Mobility},
  journal      = {Inform. Spektrum},
  volume       = {40},
  number       = {2},
  pages        = {180--191},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00287-017-1029-2},
  doi          = {10.1007/S00287-017-1029-2},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/AminiBBBCCFHHKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/BeckersCFHH17,
  author       = {Kristian Beckers and
                  Isabelle C{\^{o}}t{\'{e}} and
                  Thomas Frese and
                  Denis Hatebur and
                  Maritta Heisel},
  title        = {A structured and systematic model-based development method for automotive
                  systems, considering the OEM/supplier interface},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {158},
  pages        = {172--184},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ress.2016.08.018},
  doi          = {10.1016/J.RESS.2016.08.018},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/BeckersCFHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/BeckersHCH17,
  author       = {Kristian Beckers and
                  Dominik Holling and
                  Isabelle C{\^{o}}t{\'{e}} and
                  Denis Hatebur},
  title        = {A structured hazard analysis and risk assessment method for automotive
                  systems - {A} descriptive study},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {158},
  pages        = {185--195},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ress.2016.09.004},
  doi          = {10.1016/J.RESS.2016.09.004},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/BeckersHCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/profes/KaciankaBKK17,
  author       = {Severin Kacianka and
                  Kristian Beckers and
                  Florian Kelbert and
                  Prachi Kumari},
  editor       = {Michael Felderer and
                  Daniel M{\'{e}}ndez Fern{\'{a}}ndez and
                  Burak Turhan and
                  Marcos Kalinowski and
                  Federica Sarro and
                  Dietmar Winkler},
  title        = {How Accountability is Implemented and Understood in Research Tools
                  - {A} Systematic Mapping Study},
  booktitle    = {Product-Focused Software Process Improvement - 18th International
                  Conference, {PROFES} 2017, Innsbruck, Austria, November 29 - December
                  1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10611},
  pages        = {199--218},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69926-4\_15},
  doi          = {10.1007/978-3-319-69926-4\_15},
  timestamp    = {Wed, 25 Sep 2019 18:15:39 +0200},
  biburl       = {https://dblp.org/rec/conf/profes/KaciankaBKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/profes/KaciankaBKK17a,
  author       = {Severin Kacianka and
                  Kristian Beckers and
                  Florian Kelbert and
                  Prachi Kumari},
  editor       = {Michael Felderer and
                  Daniel M{\'{e}}ndez Fern{\'{a}}ndez and
                  Burak Turhan and
                  Marcos Kalinowski and
                  Federica Sarro and
                  Dietmar Winkler},
  title        = {Erratum to: How Accountability is Implemented and Understood in Research
                  Tools - {A} Systematic Mapping Study},
  booktitle    = {Product-Focused Software Process Improvement - 18th International
                  Conference, {PROFES} 2017, Innsbruck, Austria, November 29 - December
                  1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10611},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69926-4\_56},
  doi          = {10.1007/978-3-319-69926-4\_56},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/profes/KaciankaBKK17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/BeckersFG017,
  author       = {Kristian Beckers and
                  Veronika Fries and
                  Eduard C. Groen and
                  Sebastian Pape},
  editor       = {Eric Knauss and
                  Angelo Susi and
                  David Ameller and
                  Daniel M. Berry and
                  Fabiano Dalpiaz and
                  Maya Daneva and
                  Marian Daun and
                  Oscar Dieste and
                  Peter Forbrig and
                  Eduard C. Groen and
                  Andrea Herrmann and
                  Jennifer Horkoff and
                  Fitsum Meshesha Kifetew and
                  Marite Kirikova and
                  Alessia Knauss and
                  Patrick Maeder and
                  Fabio Massacci and
                  Cristina Palomares and
                  Jolita Ralyt{\'{e}} and
                  Ahmed Seffah and
                  Alberto Siena and
                  Bastian Tenbergen},
  title        = {Creativity Techniques for Social Engineering Threat Elicitation: {A}
                  Controlled Experiment},
  booktitle    = {Joint Proceedings of {REFSQ-2017} Workshops, Doctoral Symposium, Research
                  Method Track, and Poster Track co-located with the 22nd International
                  Conference on Requirements Engineering: Foundation for Software Quality
                  {(REFSQ} 2017), Essen, Germany, February 27, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1796},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-1796/creare-paper-1.pdf},
  timestamp    = {Sat, 30 Sep 2023 09:55:14 +0200},
  biburl       = {https://dblp.org/rec/conf/refsq/BeckersFG017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/DurrwangBK17,
  author       = {J{\"{u}}rgen D{\"{u}}rrwang and
                  Kristian Beckers and
                  Reiner Kriesten},
  editor       = {Stefano Tonetta and
                  Erwin Schoitsch and
                  Friedemann Bitsch},
  title        = {A Lightweight Threat Analysis Approach Intertwining Safety and Security
                  for the Automotive Domain},
  booktitle    = {Computer Safety, Reliability, and Security - 36th International Conference,
                  {SAFECOMP} 2017, Trento, Italy, September 13-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10488},
  pages        = {305--319},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66266-4\_20},
  doi          = {10.1007/978-3-319-66266-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/DurrwangBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/BeckersS0S17,
  author       = {Kristian Beckers and
                  Daniel Schosser and
                  Sebastian Pape and
                  Peter Schaab},
  editor       = {Javier L{\'{o}}pez and
                  Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis},
  title        = {A Structured Comparison of Social Engineering Intelligence Gathering
                  Tools},
  booktitle    = {Trust, Privacy and Security in Digital Business - 14th International
                  Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10442},
  pages        = {232--246},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64483-7\_15},
  doi          = {10.1007/978-3-319-64483-7\_15},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/BeckersS0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-1710-05720,
  author       = {Simon Rehwald and
                  Amjad Ibrahim and
                  Kristian Beckers and
                  Alexander Pretschner},
  editor       = {Alex Groce and
                  Stefan Leue},
  title        = {ACCBench: {A} Framework for Comparing Causality Algorithms},
  booktitle    = {Proceedings 2nd International Workshop on Causal Reasoning for Embedded
                  and safety-critical Systems Technologies, CREST@ETAPS 2017, Uppsala,
                  Sweden, 29th April 2017},
  series       = {{EPTCS}},
  volume       = {259},
  pages        = {16--30},
  year         = {2017},
  url          = {https://doi.org/10.4204/EPTCS.259.2},
  doi          = {10.4204/EPTCS.259.2},
  timestamp    = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-05720.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/AminiB0BCCFHHKKKMOPPUW17,
  author       = {Sasan Amini and
                  Kristian Beckers and
                  Markus B{\"{o}}hm and
                  Fritz Busch and
                  Nihan Celikkaya and
                  Vittorio Cozzolino and
                  Anne Faber and
                  Michael Haus and
                  Dominik Huth and
                  Alfons Kemper and
                  Andreas Kipf and
                  Helmut Krcmar and
                  Florian Matthes and
                  J{\"{o}}rg Ott and
                  Christian Prehofer and
                  Alexander Pretschner and
                  {\"{O}}mer Uludag and
                  Wolfgang W{\"{o}}rndl},
  editor       = {Arndt Bode and
                  Manfred Broy and
                  Hans{-}Joachim Bungartz and
                  Florian Matthes},
  title        = {Informatik-Forschung f{\"{u}}r digitale Mobilit{\"{a}}tsplattformen},
  booktitle    = {50 Jahre Universit{\"{a}}ts-Informatik in M{\"{u}}nchen},
  pages        = {155--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54712-0\_14},
  doi          = {10.1007/978-3-662-54712-0\_14},
  timestamp    = {Fri, 02 Dec 2022 12:49:56 +0100},
  biburl       = {https://dblp.org/rec/books/sp/17/AminiB0BCCFHHKKKMOPPUW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-06843,
  author       = {Saahil Ognawala and
                  Ana Petrovska and
                  Kristian Beckers},
  title        = {An Exploratory Survey of Hybrid Testing Techniques Involving Symbolic
                  Execution and Fuzzing},
  journal      = {CoRR},
  volume       = {abs/1712.06843},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.06843},
  eprinttype    = {arXiv},
  eprint       = {1712.06843},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-06843.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/BeckersDH16,
  author       = {Kristian Beckers and
                  J{\"{u}}rgen D{\"{u}}rrwang and
                  Dominik Holling},
  title        = {Standard Compliant Hazard and Threat Analysis for the Automotive Domain},
  journal      = {Inf.},
  volume       = {7},
  number       = {3},
  pages        = {36},
  year         = {2016},
  url          = {https://doi.org/10.3390/info7030036},
  doi          = {10.3390/INFO7030036},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/BeckersDH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcshci/Beckers0F16,
  author       = {Kristian Beckers and
                  Sebastian Pape and
                  Veronika Fries},
  editor       = {Shamal Faily and
                  Nan Jiang and
                  Huseyin Dogan and
                  Jacqui Taylor},
  title        = {{HATCH:} Hack And Trick Capricious Humans - {A} Serious Game on Social
                  Engineering},
  booktitle    = {{HCI} 2016 - Fusion! Proceedings of the 30th International {BCS} Human
                  Computer Interaction Conference, {BCS} {HCI} 2016, Bournemouth University,
                  Poole, UK, 11-15 July 2016},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56973},
  timestamp    = {Wed, 07 Dec 2022 23:14:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bcshci/Beckers0F16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcshci/Ki-AriesFB16,
  author       = {Duncan Ki{-}Aries and
                  Shamal Faily and
                  Kristian Beckers},
  editor       = {Shamal Faily and
                  Nan Jiang and
                  Huseyin Dogan and
                  Jacqui Taylor},
  title        = {Persona-Driven Information Security Awareness},
  booktitle    = {{HCI} 2016 - Fusion! Proceedings of the 30th International {BCS} Human
                  Computer Interaction Conference, {BCS} {HCI} 2016, Bournemouth University,
                  Poole, UK, 11-15 July 2016},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56976},
  timestamp    = {Tue, 06 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bcshci/Ki-AriesFB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/BeckersLMPW16,
  author       = {Kristian Beckers and
                  J{\"{o}}rg Landthaler and
                  Florian Matthes and
                  Alexander Pretschner and
                  Bernhard Waltl},
  editor       = {Rainer Schmidt and
                  Wided Gu{\'{e}}dria and
                  Ilia Bider and
                  S{\'{e}}rgio Guerreiro},
  title        = {Data Accountability in Socio-Technical Systems},
  booktitle    = {Enterprise, Business-Process and Information Systems Modeling - 17th
                  International Conference, {BPMDS} 2016, 21st International Conference,
                  {EMMSAD} 2016, Held at CAiSE 2016, Ljubljana, Slovenia, June 13-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {248},
  pages        = {335--348},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39429-9\_21},
  doi          = {10.1007/978-3-319-39429-9\_21},
  timestamp    = {Fri, 19 Mar 2021 08:43:31 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/BeckersLMPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/SchaabBP16,
  author       = {Peter Schaab and
                  Kristian Beckers and
                  Sebastian Pape},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {A Systematic Gap Analysis of Social Engineering Defence Mechanisms
                  Considering Social Psychology},
  booktitle    = {Tenth International Symposium on Human Aspects of Information Security
                  {\&} Assurance, {HAISA} 2016, Frankfurt, Germany, July 19-21,
                  2016, Proceedings},
  pages        = {241--251},
  publisher    = {University of Plymouth},
  year         = {2016},
  url          = {http://www.cscan.org/openaccess/?paperid=301},
  timestamp    = {Tue, 06 Jul 2021 12:22:19 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/SchaabBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/HollingSBPG16,
  author       = {Dominik Holling and
                  Alvin Stanescu and
                  Kristian Beckers and
                  Alexander Pretschner and
                  Matthias Gemmar},
  title        = {Failure Models for Testing Continuous Controllers},
  booktitle    = {27th {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2016, Ottawa, ON, Canada, October 23-27, 2016},
  pages        = {365--375},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSRE.2016.34},
  doi          = {10.1109/ISSRE.2016.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/HollingSBPG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcis/LiPMHB16,
  author       = {Tong Li and
                  Elda Paja and
                  John Mylopoulos and
                  Jennifer Horkoff and
                  Kristian Beckers},
  title        = {Security attack analysis using attack patterns},
  booktitle    = {Tenth {IEEE} International Conference on Research Challenges in Information
                  Science, {RCIS} 2016, Grenoble, France, June 1-3, 2016},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/RCIS.2016.7549303},
  doi          = {10.1109/RCIS.2016.7549303},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/rcis/LiPMHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/Beckers016,
  author       = {Kristian Beckers and
                  Sebastian Pape},
  title        = {A Serious Game for Eliciting Social Engineering Security Requirements},
  booktitle    = {24th {IEEE} International Requirements Engineering Conference, {RE}
                  2016, Beijing, China, September 12-16, 2016},
  pages        = {16--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/RE.2016.39},
  doi          = {10.1109/RE.2016.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/Beckers016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/BeckersFLM16,
  author       = {Kristian Beckers and
                  Shamal Faily and
                  Seok{-}Won Lee and
                  Nancy R. Mead},
  title        = {Welcome to the Third Workshop on Evolving Security and Privacy Requirements
                  Engineering {(ESPRE)}},
  booktitle    = {24th {IEEE} International Requirements Engineering Conference, {RE}
                  2016, Beijing, China, September 12-16, 2016},
  pages        = {53},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/REW.2016.008},
  doi          = {10.1109/REW.2016.008},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/BeckersFLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Beckers15,
  author       = {Kristian Beckers},
  title        = {Pattern and Security Requirements - Engineering-Based Establishment
                  of Security Standards},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16664-3},
  doi          = {10.1007/978-3-319-16664-3},
  isbn         = {978-3-319-16663-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Beckers15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/BeckersKY15,
  author       = {Kristian Beckers and
                  Leanid Krautsevich and
                  Artsiom Yautsiukhin},
  title        = {Using Attack Graphs to Analyze Social Engineering Threats},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {6},
  number       = {2},
  pages        = {47--69},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJSSE.2015040103},
  doi          = {10.4018/IJSSE.2015040103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/BeckersKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip8-1/LiHPBM15,
  author       = {Tong Li and
                  Jennifer Horkoff and
                  Elda Paja and
                  Kristian Beckers and
                  John Mylopoulos},
  editor       = {Jolita Ralyt{\'{e}} and
                  Sergio Espa{\~{n}}a and
                  Oscar Pastor},
  title        = {Analyzing Attack Strategies Through Anti-goal Refinement},
  booktitle    = {The Practice of Enterprise Modeling - 8th {IFIP} {WG} 8.1. Working
                  Conference, PoEM 2015, Valencia, Spain, November 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {235},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25897-3\_6},
  doi          = {10.1007/978-3-319-25897-3\_6},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip8-1/LiHPBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istar/LiHBPM15,
  author       = {Tong Li and
                  Jennifer Horkoff and
                  Kristian Beckers and
                  Elda Paja and
                  John Mylopoulos},
  editor       = {Jaelson Castro and
                  Gilberto A. Cysneiros Filho and
                  Sotirios Liaskos},
  title        = {A Holistic Approach to Attack Modeling and Analysis},
  booktitle    = {Proceedings of the Eighth International i*Workshop, iStar 2015, in
                  conjunction with the 23rd International Requirements Engineering Conference
                  {(RE} 2015), Ottawa, Canada, August 24-25, 2015},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1402},
  pages        = {49--54},
  publisher    = {CEUR-WS.org},
  year         = {2015},
  url          = {https://ceur-ws.org/Vol-1402/paper3.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:56 +0100},
  biburl       = {https://dblp.org/rec/conf/istar/LiHBPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/LiPMHB15,
  author       = {Tong Li and
                  Elda Paja and
                  John Mylopoulos and
                  Jennifer Horkoff and
                  Kristian Beckers},
  editor       = {Didar Zowghi and
                  Vincenzo Gervasi and
                  Daniel Amyot},
  title        = {Holistic security requirements analysis: An attacker's perspective},
  booktitle    = {23rd {IEEE} International Requirements Engineering Conference, {RE}
                  2015, Ottawa, ON, Canada, August 24-28, 2015},
  pages        = {282--283},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/RE.2015.7320439},
  doi          = {10.1109/RE.2015.7320439},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/LiPMHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BeckersHMG15,
  author       = {Kristian Beckers and
                  Maritta Heisel and
                  Francisco Moyano and
                  M. Carmen Fern{\'{a}}ndez Gago},
  editor       = {Roger L. Wainwright and
                  Juan Manuel Corchado and
                  Alessio Bechini and
                  Jiman Hong},
  title        = {Engineering trust- and reputation-based security controls for future
                  internet systems},
  booktitle    = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing,
                  Salamanca, Spain, April 13-17, 2015},
  pages        = {1344--1349},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2695664.2695713},
  doi          = {10.1145/2695664.2695713},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BeckersHMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/BeckersCFHH15,
  author       = {Kristian Beckers and
                  Isabelle C{\^{o}}t{\'{e}} and
                  Thomas Frese and
                  Denis Hatebur and
                  Maritta Heisel},
  editor       = {Floor Koornneef and
                  Coen van Gulijk},
  title        = {A Structured Validation and Verification Method for Automotive Systems
                  Considering the OEM/Supplier Interface},
  booktitle    = {Computer Safety, Reliability, and Security - 34th International Conference,
                  {SAFECOMP} 2015 Delft, The Netherlands, September 23-25, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9337},
  pages        = {90--108},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24255-2\_8},
  doi          = {10.1007/978-3-319-24255-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/BeckersCFHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/BeckersCGGH14,
  author       = {Kristian Beckers and
                  Isabelle C{\^{o}}t{\'{e}} and
                  Ludger Goeke and
                  Selim G{\"{u}}ler and
                  Maritta Heisel},
  title        = {A Structured Method for Security Requirements Elicitation concerning
                  the Cloud Computing Domain},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {20--43},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014040102},
  doi          = {10.4018/IJSSE.2014040102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/BeckersCGGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BeckersHH14,
  author       = {Kristian Beckers and
                  Maritta Heisel and
                  Denis Hatebur},
  title        = {Supporting Common Criteria Security Analysis with Problem Frames},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {1},
  pages        = {37--63},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.03.31.037},
  doi          = {10.22667/JOWUA.2014.03.31.037},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BeckersHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/MoyanoBG14,
  author       = {Francisco Moyano and
                  Kristian Beckers and
                  M. Carmen Fern{\'{a}}ndez Gago},
  editor       = {Matthias Jarke and
                  John Mylopoulos and
                  Christoph Quix and
                  Colette Rolland and
                  Yannis Manolopoulos and
                  Haralambos Mouratidis and
                  Jennifer Horkoff},
  title        = {Trust-Aware Decision-Making Methodology for Cloud Sourcing},
  booktitle    = {Advanced Information Systems Engineering - 26th International Conference,
                  CAiSE 2014, Thessaloniki, Greece, June 16-20, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8484},
  pages        = {136--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07881-6\_10},
  doi          = {10.1007/978-3-319-07881-6\_10},
  timestamp    = {Fri, 27 Dec 2019 21:25:01 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/MoyanoBG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BeckersKY14,
  author       = {Kristian Beckers and
                  Leanid Krautsevich and
                  Artsiom Yautsiukhin},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Emil Lupu and
                  Joachim Posegga and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Analysis of Social Engineering Threats with Attack Graphs},
  booktitle    = {Data Privacy Management, Autonomous Spontaneous Security, and Security
                  Assurance - 9th International Workshop, {DPM} 2014, 7th International
                  Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
                  Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8872},
  pages        = {216--232},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17016-9\_14},
  doi          = {10.1007/978-3-319-17016-9\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BeckersKY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europlop/BeckersFH14,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel},
  editor       = {Veli{-}Pekka Eloranta and
                  Uwe van Heesch},
  title        = {Deriving a pattern language syntax for context-patterns},
  booktitle    = {Proceedings of the 19th European Conference on Pattern Languages of
                  Programs, EuroPLoP 2014, Irsee, Germany, July 9-13, 2014},
  pages        = {2:1--2:25},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2721956.2721967},
  doi          = {10.1145/2721956.2721967},
  timestamp    = {Tue, 06 Nov 2018 16:59:05 +0100},
  biburl       = {https://dblp.org/rec/conf/europlop/BeckersFH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europlop/BeckersFHS14,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel and
                  Santiago Suppan},
  editor       = {Veli{-}Pekka Eloranta and
                  Uwe van Heesch},
  title        = {A meta-pattern and pattern form for context-patterns},
  booktitle    = {Proceedings of the 19th European Conference on Pattern Languages of
                  Programs, EuroPLoP 2014, Irsee, Germany, July 9-13, 2014},
  pages        = {5:1--5:23},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2721956.2721979},
  doi          = {10.1145/2721956.2721979},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europlop/BeckersFHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BeckersCG14,
  author       = {Kristian Beckers and
                  Isabelle C{\^{o}}t{\'{e}} and
                  Ludger Goeke},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {A catalog of security requirements patterns for the domain of cloud
                  computing systems},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {337--342},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2554921},
  doi          = {10.1145/2554850.2554921},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BeckersCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/BeckersCFHH14,
  author       = {Kristian Beckers and
                  Isabelle C{\^{o}}t{\'{e}} and
                  Thomas Frese and
                  Denis Hatebur and
                  Maritta Heisel},
  editor       = {Andrea Bondavalli and
                  Felicita Di Giandomenico},
  title        = {Systematic Derivation of Functional Safety Requirements for Automotive
                  Systems},
  booktitle    = {Computer Safety, Reliability, and Security - 33rd International Conference,
                  {SAFECOMP} 2014, Florence, Italy, September 10-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8666},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10506-2\_5},
  doi          = {10.1007/978-3-319-10506-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/BeckersCFHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridsec/BeckersHKMMY14,
  author       = {Kristian Beckers and
                  Maritta Heisel and
                  Leanid Krautsevich and
                  Fabio Martinelli and
                  Rene Meis and
                  Artsiom Yautsiukhin},
  editor       = {Jorge Cu{\'{e}}llar},
  title        = {Determining the Probability of Smart Grid Attacks by Combining Attack
                  Tree and Attack Graph Analysis},
  booktitle    = {Smart Grid Security - Second International Workshop, SmartGridSec
                  2014, Munich, Germany, February 26, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8448},
  pages        = {30--47},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10329-7\_3},
  doi          = {10.1007/978-3-319-10329-7\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridsec/BeckersHKMMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridsec/BeckersFHS14,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel and
                  Santiago Suppan},
  editor       = {Jorge Cu{\'{e}}llar},
  title        = {A Threat Analysis Methodology for Smart Home Scenarios},
  booktitle    = {Smart Grid Security - Second International Workshop, SmartGridSec
                  2014, Munich, Germany, February 26, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8448},
  pages        = {94--124},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10329-7\_7},
  doi          = {10.1007/978-3-319-10329-7\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridsec/BeckersFHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridsec/MoyanoGBH14,
  author       = {Francisco Moyano and
                  M. Carmen Fern{\'{a}}ndez Gago and
                  Kristian Beckers and
                  Maritta Heisel},
  editor       = {Jorge Cu{\'{e}}llar},
  title        = {Enhancing Problem Frames with Trust and Reputation for Analyzing Smart
                  Grid Security Requirements},
  booktitle    = {Smart Grid Security - Second International Workshop, SmartGridSec
                  2014, Munich, Germany, February 26, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8448},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10329-7\_11},
  doi          = {10.1007/978-3-319-10329-7\_11},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridsec/MoyanoGBH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/Beckers14,
  author       = {Kristian Beckers},
  editor       = {Viliam Geffert and
                  Bart Preneel and
                  Branislav Rovan and
                  Julius Stuller and
                  A Min Tjoa},
  title        = {Goal-Based Establishment of an Information Security Management System
                  Compliant to {ISO} 27001},
  booktitle    = {{SOFSEM} 2014: Theory and Practice of Computer Science - 40th International
                  Conference on Current Trends in Theory and Practice of Computer Science,
                  Nov{\'{y}} Smokovec, Slovakia, January 26-29, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8327},
  pages        = {102--113},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04298-5\_10},
  doi          = {10.1007/978-3-319-04298-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/Beckers14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/BeckersFGHKM14,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Stefanos Gritzalis and
                  Maritta Heisel and
                  Christos Kalloniatis and
                  Rene Meis},
  editor       = {Claudia Eckert and
                  Sokratis K. Katsikas and
                  G{\"{u}}nther Pernul},
  title        = {Privacy-Aware Cloud Deployment Scenario Selection},
  booktitle    = {Trust, Privacy, and Security in Digital Business - 11th International
                  Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8647},
  pages        = {94--105},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09770-1\_9},
  doi          = {10.1007/978-3-319-09770-1\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/BeckersFGHKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BeckersCFHH14,
  author       = {Kristian Beckers and
                  Isabelle C{\^{o}}t{\'{e}} and
                  Stefan Fenz and
                  Denis Hatebur and
                  Maritta Heisel},
  editor       = {Maritta Heisel and
                  Wouter Joosen and
                  Javier L{\'{o}}pez and
                  Fabio Martinelli},
  title        = {A Structured Comparison of Security Standards},
  booktitle    = {Engineering Secure Future Internet Services and Systems - Current
                  Research},
  series       = {Lecture Notes in Computer Science},
  volume       = {8431},
  pages        = {1--34},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07452-8\_1},
  doi          = {10.1007/978-3-319-07452-8\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/BeckersCFHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BeckersHSS14,
  author       = {Kristian Beckers and
                  Maritta Heisel and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  editor       = {Maritta Heisel and
                  Wouter Joosen and
                  Javier L{\'{o}}pez and
                  Fabio Martinelli},
  title        = {{ISMS-CORAS:} {A} Structured Method for Establishing an {ISO} 27001
                  Compliant Information Security Management System},
  booktitle    = {Engineering Secure Future Internet Services and Systems - Current
                  Research},
  series       = {Lecture Notes in Computer Science},
  volume       = {8431},
  pages        = {315--344},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07452-8\_13},
  doi          = {10.1007/978-3-319-07452-8\_13},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/BeckersHSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/re/2014espre,
  editor       = {Kristian Beckers and
                  Shamal Faily and
                  Seok{-}Won Lee and
                  Nancy R. Mead},
  title        = {{IEEE} 1st Workshop on Evolving Security and Privacy Requirements
                  Engineering, {ESPRE} 2014, 25 August, 2014, Karlskrona, Sweden},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6883269/proceeding},
  isbn         = {978-1-4799-6340-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/re/2014espre.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/BeckersCFHH13,
  author       = {Kristian Beckers and
                  Isabelle C{\^{o}}t{\'{e}} and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel and
                  Stefan Hofbauer},
  title        = {A pattern-based method for establishing a cloud-specific information
                  security management system - Establishing information security management
                  systems for clouds considering security, privacy, and legal compliance},
  journal      = {Requir. Eng.},
  volume       = {18},
  number       = {4},
  pages        = {343--395},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00766-013-0174-7},
  doi          = {10.1007/S00766-013-0174-7},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/BeckersCFHH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/BeckersCFHH13a,
  author       = {Kristian Beckers and
                  Isabelle C{\^{o}}t{\'{e}} and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel and
                  Stefan Hofbauer},
  title        = {Erratum to: {A} pattern-based method for establishing a cloud-specific
                  information security management system},
  journal      = {Requir. Eng.},
  volume       = {18},
  number       = {4},
  pages        = {397},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00766-013-0176-5},
  doi          = {10.1007/S00766-013-0176-5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/BeckersCFHH13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersHH13,
  author       = {Kristian Beckers and
                  Denis Hatebur and
                  Maritta Heisel},
  title        = {A Problem-Based Threat Analysis in Compliance with Common Criteria},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {111--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.21},
  doi          = {10.1109/ARES.2013.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersHH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersFHP13,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel and
                  Federica Paci},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Combining Goal-Oriented and Problem-Oriented Requirements Engineering
                  Methods},
  booktitle    = {Availability, Reliability, and Security in Information Systems and
                  {HCI} - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference,
                  {CD-ARES} 2013, Regensburg, Germany, September 2-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8127},
  pages        = {178--194},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40511-2\_13},
  doi          = {10.1007/978-3-642-40511-2\_13},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersFHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersHQW13,
  author       = {Kristian Beckers and
                  Stefan Hofbauer and
                  Gerald Quirchmayr and
                  Christopher C. Wills},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {A Method for Re-using Existing {ITIL} Processes for Creating an {ISO}
                  27001 {ISMS} Process Applied to a High Availability Video Conferencing
                  Cloud Scenario},
  booktitle    = {Availability, Reliability, and Security in Information Systems and
                  {HCI} - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference,
                  {CD-ARES} 2013, Regensburg, Germany, September 2-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8127},
  pages        = {224--239},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40511-2\_16},
  doi          = {10.1007/978-3-642-40511-2\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersHQW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersHCGG13,
  author       = {Kristian Beckers and
                  Maritta Heisel and
                  Isabelle C{\^{o}}t{\'{e}} and
                  Ludger Goeke and
                  Selim G{\"{u}}ler},
  title        = {Structured Pattern-Based Security Requirements Elicitation for Clouds},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {465--474},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.61},
  doi          = {10.1109/ARES.2013.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersHCGG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersH13,
  author       = {Kristian Beckers and
                  Maritta Heisel},
  title        = {A Usability Evaluation of the NESSoS Common Body of Knowledge},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {559--568},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.74},
  doi          = {10.1109/ARES.2013.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europlop/BeckersFH13,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel},
  editor       = {Uwe van Heesch and
                  Christian Kohls},
  title        = {A meta-model for context-patterns},
  booktitle    = {Proceedings of the 18th European Conference on Pattern Languages of
                  Program, EuroPLoP 2013, Irsee, Germany, July 10-14, 2013},
  pages        = {5:1--5:15},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2739011.2739016},
  doi          = {10.1145/2739011.2739016},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europlop/BeckersFH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/BeckersHFH13,
  author       = {Kristian Beckers and
                  Maritta Heisel and
                  Thomas Frese and
                  Denis Hatebur},
  title        = {A structured and model-based hazard analysis and risk assessment method
                  for automotive systems},
  booktitle    = {{IEEE} 24th International Symposium on Software Reliability Engineering,
                  {ISSRE} 2013, Pasadena, CA, USA, November 4-7, 2013},
  pages        = {238--247},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSRE.2013.6698923},
  doi          = {10.1109/ISSRE.2013.6698923},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/BeckersHFH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BeckersFHHC13,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Denis Hatebur and
                  Maritta Heisel and
                  Isabelle C{\^{o}}t{\'{e}}},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {Common criteria compliant software development {(CC-CASD)}},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {1298--1304},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480604},
  doi          = {10.1145/2480362.2480604},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BeckersFHHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersEFHSS12,
  author       = {Kristian Beckers and
                  Stefan Eicker and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel and
                  Holger Schmidt and
                  Widura Schwittek},
  editor       = {Gerald Quirchmayr and
                  Josef Basl and
                  Ilsun You and
                  Lida Xu and
                  Edgar R. Weippl},
  title        = {Ontology-Based Identification of Research Gaps and Immature Research
                  Areas},
  booktitle    = {Multidisciplinary Research and Practice for Information Systems -
                  {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and
                  Workshop on Availability, Reliability, and Security, {CD-ARES} 2012,
                  Prague, Czech Republic, August 20-24, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7465},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32498-7\_1},
  doi          = {10.1007/978-3-642-32498-7\_1},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersEFHSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersH12,
  author       = {Kristian Beckers and
                  Maritta Heisel},
  editor       = {Gerald Quirchmayr and
                  Josef Basl and
                  Ilsun You and
                  Lida Xu and
                  Edgar R. Weippl},
  title        = {A Foundation for Requirements Analysis of Privacy Preserving Software},
  booktitle    = {Multidisciplinary Research and Practice for Information Systems -
                  {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and
                  Workshop on Availability, Reliability, and Security, {CD-ARES} 2012,
                  Prague, Czech Republic, August 20-24, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7465},
  pages        = {93--107},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32498-7\_8},
  doi          = {10.1007/978-3-642-32498-7\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersFHS12,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel and
                  Holger Schmidt},
  title        = {Using Security Requirements Engineering Approaches to Support {ISO}
                  27001 Information Security Management Systems Development and Documentation},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {242--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.35},
  doi          = {10.1109/ARES.2012.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersFHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HofbauerBQ12,
  author       = {Stefan Hofbauer and
                  Kristian Beckers and
                  Gerald Quirchmayr},
  title        = {A Privacy preserving Approach to Call Detail Records Analysis in VoIP
                  Systems},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {307--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.22},
  doi          = {10.1109/ARES.2012.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HofbauerBQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersFS12,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Holger Schmidt},
  title        = {An Integrated Method for Pattern-Based Elicitation of Legal Requirements
                  Applied to a Cloud Computing Example},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {463--472},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.25},
  doi          = {10.1109/ARES.2012.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersF12,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender},
  title        = {Peer-to-Peer Driven Software Engineering Considering Security, Reliability,
                  and Performance},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {485--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.26},
  doi          = {10.1109/ARES.2012.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SchwittekSBEFH12,
  author       = {Widura Schwittek and
                  Holger Schmidt and
                  Kristian Beckers and
                  Stefan Eicker and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel},
  title        = {A Common Body of Knowledge for Engineering Secure Software and Services},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {499--506},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.31},
  doi          = {10.1109/ARES.2012.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SchwittekSBEFH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Beckers12,
  author       = {Kristian Beckers},
  title        = {Comparing Privacy Requirements Engineering Approaches},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {574--581},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.29},
  doi          = {10.1109/ARES.2012.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Beckers12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/BeckersFHM12,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel and
                  Rene Meis},
  editor       = {Bart Preneel and
                  Demosthenes Ikonomou},
  title        = {A Problem-Based Approach for Computer-Aided Privacy Threat Identification},
  booktitle    = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF}
                  2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8319},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-54069-1\_1},
  doi          = {10.1007/978-3-642-54069-1\_1},
  timestamp    = {Sat, 19 Oct 2019 20:10:28 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/BeckersFHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bir/HofbauerBQ12,
  author       = {Stefan Hofbauer and
                  Kristian Beckers and
                  Gerald Quirchmayr},
  editor       = {Natalia Aseeva and
                  Eduard Babkin and
                  Oleg Kozyrev},
  title        = {Conducting a Privacy Impact Analysis for the Analysis of Communication
                  Records},
  booktitle    = {Perspectives in Business Informatics Research - 11th International
                  Conference, {BIR} 2012, Nizhny Novgorod, Russia, September 24-26,
                  2012. Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {128},
  pages        = {148--161},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33281-4\_12},
  doi          = {10.1007/978-3-642-33281-4\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bir/HofbauerBQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BeckersFHM12,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel and
                  Rene Meis},
  editor       = {Maritta Heisel},
  title        = {Pattern-Based Context Establishment for Service-Oriented Architectures},
  booktitle    = {Software Service and Application Engineering - Essays Dedicated to
                  Bernd Kr{\"{a}}mer on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {7365},
  pages        = {81--101},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30835-2\_7},
  doi          = {10.1007/978-3-642-30835-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BeckersFHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/BeckersFHKS12,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Maritta Heisel and
                  Jan{-}Christoph K{\"{u}}ster and
                  Holger Schmidt},
  editor       = {Gilles Barthe and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {Supporting the Development and Documentation of {ISO} 27001 Information
                  Security Management Systems through Security Requirements Engineering
                  Approaches},
  booktitle    = {Engineering Secure Software and Systems - 4th International Symposium,
                  ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7159},
  pages        = {14--21},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28166-2\_2},
  doi          = {10.1007/978-3-642-28166-2\_2},
  timestamp    = {Sat, 19 Oct 2019 20:24:21 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/BeckersFHKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/BeckersFKS12,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Jan{-}Christoph K{\"{u}}ster and
                  Holger Schmidt},
  editor       = {Bj{\"{o}}rn Regnell and
                  Daniela E. Damian},
  title        = {A Pattern-Based Method for Identifying and Analyzing Laws},
  booktitle    = {Requirements Engineering: Foundation for Software Quality - 18th International
                  Working Conference, {REFSQ} 2012, Essen, Germany, March 19-22, 2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7195},
  pages        = {256--262},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28714-5\_23},
  doi          = {10.1007/978-3-642-28714-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/refsq/BeckersFKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/BeckersF12,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender},
  editor       = {Stefan J{\"{a}}hnichen and
                  Bernhard Rumpe and
                  Holger Schlingloff},
  title        = {Supporting the context establishment according to {ISO} 27005 using
                  patterns},
  booktitle    = {Software Engineering 2012 - Workshopband, Fachtagung des GI-Fachbereichs
                  Softwaretechnik, 27. Februar - 2. M{\"{a}}rz 2012 in Berlin},
  series       = {{LNI}},
  volume       = {{P-199}},
  pages        = {141--146},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18381},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/se/BeckersF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HofbauerBQS12,
  author       = {Stefan Hofbauer and
                  Kristian Beckers and
                  Gerald Quirchmayr and
                  Christoph Sorge},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {A Lightweight Privacy Preserving Approach for Analyzing Communication
                  Records to Prevent VoIP Attacks Using Toll Fraud as an Example},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {992--997},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.38},
  doi          = {10.1109/TRUSTCOM.2012.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HofbauerBQS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BeckersSKF11,
  author       = {Kristian Beckers and
                  Holger Schmidt and
                  Jan{-}Christoph K{\"{u}}ster and
                  Stephan Fa{\ss}bender},
  title        = {Pattern-Based Support for Context Establishment and Asset Identification
                  of the {ISO} 27000 in the Field of Cloud Computing},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {327--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.55},
  doi          = {10.1109/ARES.2011.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BeckersSKF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/BeckersJ10,
  author       = {Kristian Beckers and
                  Jan J{\"{u}}rjens},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Security and Compliance in Clouds},
  booktitle    = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2010 Conference, Berlin,
                  Germany, October 5-7, 2010},
  pages        = {91--100},
  publisher    = {Vieweg+Teubner},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-8348-9788-6\_9},
  doi          = {10.1007/978-3-8348-9788-6\_9},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/BeckersJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SeedorfBH09,
  author       = {Jan Seedorf and
                  Kristian Beckers and
                  Felipe Huici},
  title        = {Single-message denial-of-service attacks against voice-over-internet
                  protocol terminals},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {2},
  number       = {1},
  pages        = {29--34},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJESDF.2009.023873},
  doi          = {10.1504/IJESDF.2009.023873},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SeedorfBH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics