Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kristian Beckers
@inproceedings{DBLP:conf/sofsem/MoyonMBK21, author = {Fabiola Moyon and Daniel M{\'{e}}ndez and Kristian Beckers and Sebastian Klepper}, editor = {Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong}, title = {Using Process Models to Understand Security Standards}, booktitle = {{SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12607}, pages = {458--471}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-67731-2\_34}, doi = {10.1007/978-3-030-67731-2\_34}, timestamp = {Sun, 25 Jul 2021 11:44:25 +0200}, biburl = {https://dblp.org/rec/conf/sofsem/MoyonMBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-02100, author = {Tiago Espinha Gasiba and Kristian Beckers and Santiago Suppan and Filip Rezabek}, title = {On the Requirements for Serious Games geared towards Software Developers in the Industry}, journal = {CoRR}, volume = {abs/2101.02100}, year = {2021}, url = {https://arxiv.org/abs/2101.02100}, eprinttype = {arXiv}, eprint = {2101.02100}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-02100.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-02106, author = {James Barela and Tiago Espinha Gasiba and Santiago Reinhard Suppan and Marc Berges and Kristian Beckers}, title = {When Interactive Graphic Storytelling Fails}, journal = {CoRR}, volume = {abs/2101.02106}, year = {2021}, url = {https://arxiv.org/abs/2101.02106}, eprinttype = {arXiv}, eprint = {2101.02106}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-02106.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13024, author = {Fabiola Moy{\'{o}}n Constante and Rafael Soares and Maria Pinto{-}Albuquerque and Daniel M{\'{e}}ndez and Kristian Beckers}, title = {Integration of Security Standards in DevOps Pipelines: An Industry Case Study}, journal = {CoRR}, volume = {abs/2105.13024}, year = {2021}, url = {https://arxiv.org/abs/2105.13024}, eprinttype = {arXiv}, eprint = {2105.13024}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13404, author = {Fabiola Moy{\'{o}}n and Daniel M{\'{e}}ndez Fern{\'{a}}ndez and Kristian Beckers and Sebastian Klepper}, title = {How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale?}, journal = {CoRR}, volume = {abs/2105.13404}, year = {2021}, url = {https://arxiv.org/abs/2105.13404}, eprinttype = {arXiv}, eprint = {2105.13404}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13404.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13413, author = {Fabiola Moy{\'{o}}n and Daniel M{\'{e}}ndez and Kristian Beckers and Sebastian Klepper}, title = {Using Process Models to understand Security Standards}, journal = {CoRR}, volume = {abs/2105.13413}, year = {2021}, url = {https://arxiv.org/abs/2105.13413}, eprinttype = {arXiv}, eprint = {2105.13413}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13413.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/espre-ws/BeckersKLY20, author = {Kristian Beckers and Duncan Ki{-}Aries and Seok{-}Won Lee and Yijun Yu}, title = {Welcome from the {ESPRE} 2020 Organisers}, booktitle = {7th {IEEE} International Workshop on Evolving Security {\&} Privacy Requirements Engineering, ESPRE@RE 2020, Zurich, Switzerland, August 31, 2020}, pages = {vi}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ESPRE51200.2020.00005}, doi = {10.1109/ESPRE51200.2020.00005}, timestamp = {Tue, 20 Oct 2020 15:13:41 +0200}, biburl = {https://dblp.org/rec/conf/espre-ws/BeckersKLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mstec/PapeGQB20, author = {Sebastian Pape and Ludger Goeke and Alejandro Quintanar and Kristian Beckers}, editor = {George Hatzivasilis and Sotiris Ioannidis}, title = {Conceptualization of a CyberSecurity Awareness Quiz}, booktitle = {Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, {MSTEC} 2020, Guildford, UK, September 14-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12512}, pages = {61--76}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62433-0\_4}, doi = {10.1007/978-3-030-62433-0\_4}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mstec/PapeGQB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/profes/MoyonMBK20, author = {Fabiola Moyon and Daniel M{\'{e}}ndez and Kristian Beckers and Sebastian Klepper}, editor = {Maurizio Morisio and Marco Torchiano and Andreas Jedlitschka}, title = {How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale?}, booktitle = {Product-Focused Software Process Improvement - 21st International Conference, {PROFES} 2020, Turin, Italy, November 25-27, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12562}, pages = {69--87}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64148-1\_5}, doi = {10.1007/978-3-030-64148-1\_5}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/profes/MoyonMBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/profes/MoyonSPMB20, author = {Fabiola Moyon and Rafael Soares and Maria Pinto{-}Albuquerque and Daniel M{\'{e}}ndez and Kristian Beckers}, editor = {Maurizio Morisio and Marco Torchiano and Andreas Jedlitschka}, title = {Integration of Security Standards in DevOps Pipelines: An Industry Case Study}, booktitle = {Product-Focused Software Process Improvement - 21st International Conference, {PROFES} 2020, Turin, Italy, November 25-27, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12562}, pages = {434--452}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64148-1\_27}, doi = {10.1007/978-3-030-64148-1\_27}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/profes/MoyonSPMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofsem/ConstanteBFDB20, author = {Fabiola Moy{\'{o}}n Constante and Christoph Bayr and Daniel M{\'{e}}ndez Fern{\'{a}}ndez and Sebastian D{\"{a}}nnart and Kristian Beckers}, editor = {Alexander Chatzigeorgiou and Riccardo Dondi and Herodotos Herodotou and Christos A. Kapoutsis and Yannis Manolopoulos and George A. Papadopoulos and Florian Sikora}, title = {A Light-Weight Tool for the Self-assessment of Security Compliance in Software Development - An Industry Case}, booktitle = {{SOFSEM} 2020: Theory and Practice of Computer Science - 46th International Conference on Current Trends in Theory and Practice of Informatics, {SOFSEM} 2020, Limassol, Cyprus, January 20-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12011}, pages = {403--416}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38919-2\_33}, doi = {10.1007/978-3-030-38919-2\_33}, timestamp = {Fri, 07 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sofsem/ConstanteBFDB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/DannartCB19, author = {Sebastian D{\"{a}}nnart and Fabiola Moy{\'{o}}n Constante and Kristian Beckers}, editor = {Paolo Giorgini and Barbara Weber}, title = {An Assessment Model for Continuous Security Compliance in Large Scale Agile Environments - Exploratory Paper}, booktitle = {Advanced Information Systems Engineering - 31st International Conference, CAiSE 2019, Rome, Italy, June 3-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11483}, pages = {529--544}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21290-2\_33}, doi = {10.1007/978-3-030-21290-2\_33}, timestamp = {Wed, 29 May 2019 12:15:56 +0200}, biburl = {https://dblp.org/rec/conf/caise/DannartCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GoekeQBP19, author = {Ludger Goeke and Alejandro Quintanar and Kristian Beckers and Sebastian Pape}, editor = {Apostolos P. Fournaris and Manos Athanatos and Konstantinos Lampropoulos and Sotiris Ioannidis and George Hatzivasilis and Ernesto Damiani and Habtamu Abie and Silvio Ranise and Luca Verderame and Alberto Siena and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {{PROTECT} - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks}, booktitle = {Computer Security - {ESORICS} 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11981}, pages = {156--171}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42051-2\_11}, doi = {10.1007/978-3-030-42051-2\_11}, timestamp = {Mon, 03 Jan 2022 22:15:08 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GoekeQBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SoultatosFSKDBW19, author = {Othonas Soultatos and Konstantinos Fysarakis and George Spanoudakis and Hristo Koshutanski and Ernesto Damiani and Kristian Beckers and Dirk Wortmann and George Bravos and Menelaos Ioannidis}, editor = {Apostolos P. Fournaris and Manos Athanatos and Konstantinos Lampropoulos and Sotiris Ioannidis and George Hatzivasilis and Ernesto Damiani and Habtamu Abie and Silvio Ranise and Luca Verderame and Alberto Siena and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {The {THREAT-ARREST} Cyber-Security Training Platform}, booktitle = {Computer Security - {ESORICS} 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11981}, pages = {199--214}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42051-2\_14}, doi = {10.1007/978-3-030-42051-2\_14}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SoultatosFSKDBW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BeckersKLM19, author = {Kristian Beckers and Duncan Ki{-}Aries and Seok{-}Won Lee and Nancy Mead}, title = {Preface Sixth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'19)}, booktitle = {27th {IEEE} International Requirements Engineering Conference Workshops, {RE} 2019 Workshops, Jeju Island, Korea (South), September 23-27, 2019}, pages = {133}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/REW.2019.00028}, doi = {10.1109/REW.2019.00028}, timestamp = {Tue, 07 Jan 2020 13:48:59 +0100}, biburl = {https://dblp.org/rec/conf/re/BeckersKLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BarelaGSBB19, author = {James Barela and Tiago Espinha Gasiba and Santiago Reinhard Suppan and Marc Berges and Kristian Beckers}, title = {When Interactive Graphic Storytelling Fails}, booktitle = {27th {IEEE} International Requirements Engineering Conference Workshops, {RE} 2019 Workshops, Jeju Island, Korea (South), September 23-27, 2019}, pages = {164--169}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/REW.2019.00034}, doi = {10.1109/REW.2019.00034}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/BarelaGSBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GasibaBSR19, author = {Tiago Espinha Gasiba and Kristian Beckers and Santiago Suppan and Filip Rezabek}, editor = {Daniela E. Damian and Anna Perini and Seok{-}Won Lee}, title = {On the Requirements for Serious Games Geared Towards Software Developers in the Industry}, booktitle = {27th {IEEE} International Requirements Engineering Conference, {RE} 2019, Jeju Island, Korea (South), September 23-27, 2019}, pages = {286--296}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/RE.2019.00038}, doi = {10.1109/RE.2019.00038}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/GasibaBSR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AllodiBFB18, author = {Luca Allodi and Sebastian Banescu and Henning Femmer and Kristian Beckers}, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {Identifying Relevant Information Cues for Vulnerability Assessment Using {CVSS}}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {119--126}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3176258.3176340}, doi = {10.1145/3176258.3176340}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/AllodiBFB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/MoyonBKLB18, author = {Fabiola Moyon and Kristian Beckers and Sebastian Klepper and Philipp Lachberger and Bernd Bruegge}, editor = {Jan Bosch and Brian Fitzgerald and Michael Goedicke and Helena Holmstr{\"{o}}m Olsson and Marco Konersmann and Stephan Krusche}, title = {Towards continuous security compliance in agile software development at scale}, booktitle = {Proceedings of the 4th International Workshop on Rapid Continuous Software Engineering, RCoSE@ICSE 2018, Gothenburg, Sweden, May 29, 2018}, pages = {31--34}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194760.3194767}, doi = {10.1145/3194760.3194767}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/MoyonBKLB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/MaidlKCB18, author = {Monika Maidl and Dirk Kr{\"{o}}selberg and Jochen Christ and Kristian Beckers}, editor = {Sudipto Ghosh and Roberto Natella and Bojan Cukic and Robin S. Poston and Nuno Laranjeiro}, title = {A Comprehensive Framework for Security in Engineering Projects - Based on {IEC} 62443}, booktitle = {2018 {IEEE} International Symposium on Software Reliability Engineering Workshops, {ISSRE} Workshops, Memphis, TN, USA, October 15-18, 2018}, pages = {42--47}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ISSREW.2018.00-33}, doi = {10.1109/ISSREW.2018.00-33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/MaidlKCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/AladawyB018, author = {Dina Aladawy and Kristian Beckers and Sebastian Pape}, editor = {Steven Furnell and Haralambos Mouratidis and G{\"{u}}nther Pernul}, title = {{PERSUADED:} Fighting Social Engineering Attacks with a Serious Game}, booktitle = {Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11033}, pages = {103--118}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98385-1\_8}, doi = {10.1007/978-3-319-98385-1\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/AladawyB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/re/2018espre, editor = {Kristian Beckers and Shamal Faily and Seok{-}Won Lee and Nancy R. Mead}, title = {5th {IEEE} International Workshop on Evolving Security {\&} Privacy Requirements Engineering, ESPRE@RE 2018, Banff, AB, Canada, August 20, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8500722/proceeding}, isbn = {978-1-5386-8420-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/2018espre.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-07648, author = {Luca Allodi and Sebastian Banescu and Henning Femmer and Kristian Beckers}, title = {Identifying Relevant Information Cues for Vulnerability Assessment Using {CVSS}}, journal = {CoRR}, volume = {abs/1803.07648}, year = {2018}, url = {http://arxiv.org/abs/1803.07648}, eprinttype = {arXiv}, eprint = {1803.07648}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-07648.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SchaabBP17, author = {Peter Schaab and Kristian Beckers and Sebastian Pape}, title = {Social engineering defence mechanisms and counteracting training strategies}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {2}, pages = {206--222}, year = {2017}, url = {https://doi.org/10.1108/ICS-04-2017-0022}, doi = {10.1108/ICS-04-2017-0022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SchaabBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/AminiBBBCCFHHKK17, author = {Sasan Amini and Kristian Beckers and Markus B{\"{o}}hm and Fritz Busch and Nihan Celikkaya and Vittorio Cozzolino and Anne Faber and Michael Haus and Dominik Huth and Alfons Kemper and Andreas Kipf and Helmut Krcmar and Florian Matthes and J{\"{o}}rg Ott and Christian Prehofer and Alexander Pretschner and {\"{O}}mer Uludag and Wolfgang W{\"{o}}rndl}, title = {Informatikforschung f{\"{u}}r digitale Mobilit{\"{a}}tsplattformen - Am Beispiel des {TUM} Living Lab Connected Mobility}, journal = {Inform. Spektrum}, volume = {40}, number = {2}, pages = {180--191}, year = {2017}, url = {https://doi.org/10.1007/s00287-017-1029-2}, doi = {10.1007/S00287-017-1029-2}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/AminiBBBCCFHHKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/BeckersCFHH17, author = {Kristian Beckers and Isabelle C{\^{o}}t{\'{e}} and Thomas Frese and Denis Hatebur and Maritta Heisel}, title = {A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interface}, journal = {Reliab. Eng. Syst. Saf.}, volume = {158}, pages = {172--184}, year = {2017}, url = {https://doi.org/10.1016/j.ress.2016.08.018}, doi = {10.1016/J.RESS.2016.08.018}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/BeckersCFHH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/BeckersHCH17, author = {Kristian Beckers and Dominik Holling and Isabelle C{\^{o}}t{\'{e}} and Denis Hatebur}, title = {A structured hazard analysis and risk assessment method for automotive systems - {A} descriptive study}, journal = {Reliab. Eng. Syst. Saf.}, volume = {158}, pages = {185--195}, year = {2017}, url = {https://doi.org/10.1016/j.ress.2016.09.004}, doi = {10.1016/J.RESS.2016.09.004}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/BeckersHCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/profes/KaciankaBKK17, author = {Severin Kacianka and Kristian Beckers and Florian Kelbert and Prachi Kumari}, editor = {Michael Felderer and Daniel M{\'{e}}ndez Fern{\'{a}}ndez and Burak Turhan and Marcos Kalinowski and Federica Sarro and Dietmar Winkler}, title = {How Accountability is Implemented and Understood in Research Tools - {A} Systematic Mapping Study}, booktitle = {Product-Focused Software Process Improvement - 18th International Conference, {PROFES} 2017, Innsbruck, Austria, November 29 - December 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10611}, pages = {199--218}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69926-4\_15}, doi = {10.1007/978-3-319-69926-4\_15}, timestamp = {Wed, 25 Sep 2019 18:15:39 +0200}, biburl = {https://dblp.org/rec/conf/profes/KaciankaBKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/profes/KaciankaBKK17a, author = {Severin Kacianka and Kristian Beckers and Florian Kelbert and Prachi Kumari}, editor = {Michael Felderer and Daniel M{\'{e}}ndez Fern{\'{a}}ndez and Burak Turhan and Marcos Kalinowski and Federica Sarro and Dietmar Winkler}, title = {Erratum to: How Accountability is Implemented and Understood in Research Tools - {A} Systematic Mapping Study}, booktitle = {Product-Focused Software Process Improvement - 18th International Conference, {PROFES} 2017, Innsbruck, Austria, November 29 - December 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10611}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69926-4\_56}, doi = {10.1007/978-3-319-69926-4\_56}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/profes/KaciankaBKK17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refsq/BeckersFG017, author = {Kristian Beckers and Veronika Fries and Eduard C. Groen and Sebastian Pape}, editor = {Eric Knauss and Angelo Susi and David Ameller and Daniel M. Berry and Fabiano Dalpiaz and Maya Daneva and Marian Daun and Oscar Dieste and Peter Forbrig and Eduard C. Groen and Andrea Herrmann and Jennifer Horkoff and Fitsum Meshesha Kifetew and Marite Kirikova and Alessia Knauss and Patrick Maeder and Fabio Massacci and Cristina Palomares and Jolita Ralyt{\'{e}} and Ahmed Seffah and Alberto Siena and Bastian Tenbergen}, title = {Creativity Techniques for Social Engineering Threat Elicitation: {A} Controlled Experiment}, booktitle = {Joint Proceedings of {REFSQ-2017} Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality {(REFSQ} 2017), Essen, Germany, February 27, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1796}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1796/creare-paper-1.pdf}, timestamp = {Sat, 30 Sep 2023 09:55:14 +0200}, biburl = {https://dblp.org/rec/conf/refsq/BeckersFG017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/DurrwangBK17, author = {J{\"{u}}rgen D{\"{u}}rrwang and Kristian Beckers and Reiner Kriesten}, editor = {Stefano Tonetta and Erwin Schoitsch and Friedemann Bitsch}, title = {A Lightweight Threat Analysis Approach Intertwining Safety and Security for the Automotive Domain}, booktitle = {Computer Safety, Reliability, and Security - 36th International Conference, {SAFECOMP} 2017, Trento, Italy, September 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10488}, pages = {305--319}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66266-4\_20}, doi = {10.1007/978-3-319-66266-4\_20}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/DurrwangBK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/BeckersS0S17, author = {Kristian Beckers and Daniel Schosser and Sebastian Pape and Peter Schaab}, editor = {Javier L{\'{o}}pez and Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis}, title = {A Structured Comparison of Social Engineering Intelligence Gathering Tools}, booktitle = {Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10442}, pages = {232--246}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64483-7\_15}, doi = {10.1007/978-3-319-64483-7\_15}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/BeckersS0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-1710-05720, author = {Simon Rehwald and Amjad Ibrahim and Kristian Beckers and Alexander Pretschner}, editor = {Alex Groce and Stefan Leue}, title = {ACCBench: {A} Framework for Comparing Causality Algorithms}, booktitle = {Proceedings 2nd International Workshop on Causal Reasoning for Embedded and safety-critical Systems Technologies, CREST@ETAPS 2017, Uppsala, Sweden, 29th April 2017}, series = {{EPTCS}}, volume = {259}, pages = {16--30}, year = {2017}, url = {https://doi.org/10.4204/EPTCS.259.2}, doi = {10.4204/EPTCS.259.2}, timestamp = {Wed, 12 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-05720.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/17/AminiB0BCCFHHKKKMOPPUW17, author = {Sasan Amini and Kristian Beckers and Markus B{\"{o}}hm and Fritz Busch and Nihan Celikkaya and Vittorio Cozzolino and Anne Faber and Michael Haus and Dominik Huth and Alfons Kemper and Andreas Kipf and Helmut Krcmar and Florian Matthes and J{\"{o}}rg Ott and Christian Prehofer and Alexander Pretschner and {\"{O}}mer Uludag and Wolfgang W{\"{o}}rndl}, editor = {Arndt Bode and Manfred Broy and Hans{-}Joachim Bungartz and Florian Matthes}, title = {Informatik-Forschung f{\"{u}}r digitale Mobilit{\"{a}}tsplattformen}, booktitle = {50 Jahre Universit{\"{a}}ts-Informatik in M{\"{u}}nchen}, pages = {155--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54712-0\_14}, doi = {10.1007/978-3-662-54712-0\_14}, timestamp = {Fri, 02 Dec 2022 12:49:56 +0100}, biburl = {https://dblp.org/rec/books/sp/17/AminiB0BCCFHHKKKMOPPUW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-06843, author = {Saahil Ognawala and Ana Petrovska and Kristian Beckers}, title = {An Exploratory Survey of Hybrid Testing Techniques Involving Symbolic Execution and Fuzzing}, journal = {CoRR}, volume = {abs/1712.06843}, year = {2017}, url = {http://arxiv.org/abs/1712.06843}, eprinttype = {arXiv}, eprint = {1712.06843}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-06843.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/BeckersDH16, author = {Kristian Beckers and J{\"{u}}rgen D{\"{u}}rrwang and Dominik Holling}, title = {Standard Compliant Hazard and Threat Analysis for the Automotive Domain}, journal = {Inf.}, volume = {7}, number = {3}, pages = {36}, year = {2016}, url = {https://doi.org/10.3390/info7030036}, doi = {10.3390/INFO7030036}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/BeckersDH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcshci/Beckers0F16, author = {Kristian Beckers and Sebastian Pape and Veronika Fries}, editor = {Shamal Faily and Nan Jiang and Huseyin Dogan and Jacqui Taylor}, title = {{HATCH:} Hack And Trick Capricious Humans - {A} Serious Game on Social Engineering}, booktitle = {{HCI} 2016 - Fusion! Proceedings of the 30th International {BCS} Human Computer Interaction Conference, {BCS} {HCI} 2016, Bournemouth University, Poole, UK, 11-15 July 2016}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56973}, timestamp = {Wed, 07 Dec 2022 23:14:00 +0100}, biburl = {https://dblp.org/rec/conf/bcshci/Beckers0F16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcshci/Ki-AriesFB16, author = {Duncan Ki{-}Aries and Shamal Faily and Kristian Beckers}, editor = {Shamal Faily and Nan Jiang and Huseyin Dogan and Jacqui Taylor}, title = {Persona-Driven Information Security Awareness}, booktitle = {{HCI} 2016 - Fusion! Proceedings of the 30th International {BCS} Human Computer Interaction Conference, {BCS} {HCI} 2016, Bournemouth University, Poole, UK, 11-15 July 2016}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56976}, timestamp = {Tue, 06 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bcshci/Ki-AriesFB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/BeckersLMPW16, author = {Kristian Beckers and J{\"{o}}rg Landthaler and Florian Matthes and Alexander Pretschner and Bernhard Waltl}, editor = {Rainer Schmidt and Wided Gu{\'{e}}dria and Ilia Bider and S{\'{e}}rgio Guerreiro}, title = {Data Accountability in Socio-Technical Systems}, booktitle = {Enterprise, Business-Process and Information Systems Modeling - 17th International Conference, {BPMDS} 2016, 21st International Conference, {EMMSAD} 2016, Held at CAiSE 2016, Ljubljana, Slovenia, June 13-14, 2016, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {248}, pages = {335--348}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39429-9\_21}, doi = {10.1007/978-3-319-39429-9\_21}, timestamp = {Fri, 19 Mar 2021 08:43:31 +0100}, biburl = {https://dblp.org/rec/conf/caise/BeckersLMPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/SchaabBP16, author = {Peter Schaab and Kristian Beckers and Sebastian Pape}, editor = {Nathan L. Clarke and Steven Furnell}, title = {A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology}, booktitle = {Tenth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings}, pages = {241--251}, publisher = {University of Plymouth}, year = {2016}, url = {http://www.cscan.org/openaccess/?paperid=301}, timestamp = {Tue, 06 Jul 2021 12:22:19 +0200}, biburl = {https://dblp.org/rec/conf/haisa/SchaabBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/HollingSBPG16, author = {Dominik Holling and Alvin Stanescu and Kristian Beckers and Alexander Pretschner and Matthias Gemmar}, title = {Failure Models for Testing Continuous Controllers}, booktitle = {27th {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2016, Ottawa, ON, Canada, October 23-27, 2016}, pages = {365--375}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ISSRE.2016.34}, doi = {10.1109/ISSRE.2016.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/HollingSBPG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/LiPMHB16, author = {Tong Li and Elda Paja and John Mylopoulos and Jennifer Horkoff and Kristian Beckers}, title = {Security attack analysis using attack patterns}, booktitle = {Tenth {IEEE} International Conference on Research Challenges in Information Science, {RCIS} 2016, Grenoble, France, June 1-3, 2016}, pages = {1--13}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/RCIS.2016.7549303}, doi = {10.1109/RCIS.2016.7549303}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/rcis/LiPMHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/Beckers016, author = {Kristian Beckers and Sebastian Pape}, title = {A Serious Game for Eliciting Social Engineering Security Requirements}, booktitle = {24th {IEEE} International Requirements Engineering Conference, {RE} 2016, Beijing, China, September 12-16, 2016}, pages = {16--25}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/RE.2016.39}, doi = {10.1109/RE.2016.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/Beckers016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/BeckersFLM16, author = {Kristian Beckers and Shamal Faily and Seok{-}Won Lee and Nancy R. Mead}, title = {Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering {(ESPRE)}}, booktitle = {24th {IEEE} International Requirements Engineering Conference, {RE} 2016, Beijing, China, September 12-16, 2016}, pages = {53}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/REW.2016.008}, doi = {10.1109/REW.2016.008}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/BeckersFLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Beckers15, author = {Kristian Beckers}, title = {Pattern and Security Requirements - Engineering-Based Establishment of Security Standards}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16664-3}, doi = {10.1007/978-3-319-16664-3}, isbn = {978-3-319-16663-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Beckers15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/BeckersKY15, author = {Kristian Beckers and Leanid Krautsevich and Artsiom Yautsiukhin}, title = {Using Attack Graphs to Analyze Social Engineering Threats}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {2}, pages = {47--69}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015040103}, doi = {10.4018/IJSSE.2015040103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/BeckersKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip8-1/LiHPBM15, author = {Tong Li and Jennifer Horkoff and Elda Paja and Kristian Beckers and John Mylopoulos}, editor = {Jolita Ralyt{\'{e}} and Sergio Espa{\~{n}}a and Oscar Pastor}, title = {Analyzing Attack Strategies Through Anti-goal Refinement}, booktitle = {The Practice of Enterprise Modeling - 8th {IFIP} {WG} 8.1. Working Conference, PoEM 2015, Valencia, Spain, November 10-12, 2015, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {235}, pages = {75--90}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25897-3\_6}, doi = {10.1007/978-3-319-25897-3\_6}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip8-1/LiHPBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istar/LiHBPM15, author = {Tong Li and Jennifer Horkoff and Kristian Beckers and Elda Paja and John Mylopoulos}, editor = {Jaelson Castro and Gilberto A. Cysneiros Filho and Sotirios Liaskos}, title = {A Holistic Approach to Attack Modeling and Analysis}, booktitle = {Proceedings of the Eighth International i*Workshop, iStar 2015, in conjunction with the 23rd International Requirements Engineering Conference {(RE} 2015), Ottawa, Canada, August 24-25, 2015}, series = {{CEUR} Workshop Proceedings}, volume = {1402}, pages = {49--54}, publisher = {CEUR-WS.org}, year = {2015}, url = {https://ceur-ws.org/Vol-1402/paper3.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:56 +0100}, biburl = {https://dblp.org/rec/conf/istar/LiHBPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/LiPMHB15, author = {Tong Li and Elda Paja and John Mylopoulos and Jennifer Horkoff and Kristian Beckers}, editor = {Didar Zowghi and Vincenzo Gervasi and Daniel Amyot}, title = {Holistic security requirements analysis: An attacker's perspective}, booktitle = {23rd {IEEE} International Requirements Engineering Conference, {RE} 2015, Ottawa, ON, Canada, August 24-28, 2015}, pages = {282--283}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/RE.2015.7320439}, doi = {10.1109/RE.2015.7320439}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/LiPMHB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BeckersHMG15, author = {Kristian Beckers and Maritta Heisel and Francisco Moyano and M. Carmen Fern{\'{a}}ndez Gago}, editor = {Roger L. Wainwright and Juan Manuel Corchado and Alessio Bechini and Jiman Hong}, title = {Engineering trust- and reputation-based security controls for future internet systems}, booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015}, pages = {1344--1349}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2695664.2695713}, doi = {10.1145/2695664.2695713}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/BeckersHMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/BeckersCFHH15, author = {Kristian Beckers and Isabelle C{\^{o}}t{\'{e}} and Thomas Frese and Denis Hatebur and Maritta Heisel}, editor = {Floor Koornneef and Coen van Gulijk}, title = {A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface}, booktitle = {Computer Safety, Reliability, and Security - 34th International Conference, {SAFECOMP} 2015 Delft, The Netherlands, September 23-25, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9337}, pages = {90--108}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24255-2\_8}, doi = {10.1007/978-3-319-24255-2\_8}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/BeckersCFHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/BeckersCGGH14, author = {Kristian Beckers and Isabelle C{\^{o}}t{\'{e}} and Ludger Goeke and Selim G{\"{u}}ler and Maritta Heisel}, title = {A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {2}, pages = {20--43}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014040102}, doi = {10.4018/IJSSE.2014040102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/BeckersCGGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BeckersHH14, author = {Kristian Beckers and Maritta Heisel and Denis Hatebur}, title = {Supporting Common Criteria Security Analysis with Problem Frames}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {1}, pages = {37--63}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.03.31.037}, doi = {10.22667/JOWUA.2014.03.31.037}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BeckersHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/MoyanoBG14, author = {Francisco Moyano and Kristian Beckers and M. Carmen Fern{\'{a}}ndez Gago}, editor = {Matthias Jarke and John Mylopoulos and Christoph Quix and Colette Rolland and Yannis Manolopoulos and Haralambos Mouratidis and Jennifer Horkoff}, title = {Trust-Aware Decision-Making Methodology for Cloud Sourcing}, booktitle = {Advanced Information Systems Engineering - 26th International Conference, CAiSE 2014, Thessaloniki, Greece, June 16-20, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8484}, pages = {136--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07881-6\_10}, doi = {10.1007/978-3-319-07881-6\_10}, timestamp = {Fri, 27 Dec 2019 21:25:01 +0100}, biburl = {https://dblp.org/rec/conf/caise/MoyanoBG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BeckersKY14, author = {Kristian Beckers and Leanid Krautsevich and Artsiom Yautsiukhin}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Analysis of Social Engineering Threats with Attack Graphs}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {216--232}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_14}, doi = {10.1007/978-3-319-17016-9\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BeckersKY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europlop/BeckersFH14, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel}, editor = {Veli{-}Pekka Eloranta and Uwe van Heesch}, title = {Deriving a pattern language syntax for context-patterns}, booktitle = {Proceedings of the 19th European Conference on Pattern Languages of Programs, EuroPLoP 2014, Irsee, Germany, July 9-13, 2014}, pages = {2:1--2:25}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2721956.2721967}, doi = {10.1145/2721956.2721967}, timestamp = {Tue, 06 Nov 2018 16:59:05 +0100}, biburl = {https://dblp.org/rec/conf/europlop/BeckersFH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europlop/BeckersFHS14, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Santiago Suppan}, editor = {Veli{-}Pekka Eloranta and Uwe van Heesch}, title = {A meta-pattern and pattern form for context-patterns}, booktitle = {Proceedings of the 19th European Conference on Pattern Languages of Programs, EuroPLoP 2014, Irsee, Germany, July 9-13, 2014}, pages = {5:1--5:23}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2721956.2721979}, doi = {10.1145/2721956.2721979}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europlop/BeckersFHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BeckersCG14, author = {Kristian Beckers and Isabelle C{\^{o}}t{\'{e}} and Ludger Goeke}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {A catalog of security requirements patterns for the domain of cloud computing systems}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {337--342}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2554921}, doi = {10.1145/2554850.2554921}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/BeckersCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/BeckersCFHH14, author = {Kristian Beckers and Isabelle C{\^{o}}t{\'{e}} and Thomas Frese and Denis Hatebur and Maritta Heisel}, editor = {Andrea Bondavalli and Felicita Di Giandomenico}, title = {Systematic Derivation of Functional Safety Requirements for Automotive Systems}, booktitle = {Computer Safety, Reliability, and Security - 33rd International Conference, {SAFECOMP} 2014, Florence, Italy, September 10-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8666}, pages = {65--80}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10506-2\_5}, doi = {10.1007/978-3-319-10506-2\_5}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/BeckersCFHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridsec/BeckersHKMMY14, author = {Kristian Beckers and Maritta Heisel and Leanid Krautsevich and Fabio Martinelli and Rene Meis and Artsiom Yautsiukhin}, editor = {Jorge Cu{\'{e}}llar}, title = {Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis}, booktitle = {Smart Grid Security - Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8448}, pages = {30--47}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10329-7\_3}, doi = {10.1007/978-3-319-10329-7\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridsec/BeckersHKMMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridsec/BeckersFHS14, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Santiago Suppan}, editor = {Jorge Cu{\'{e}}llar}, title = {A Threat Analysis Methodology for Smart Home Scenarios}, booktitle = {Smart Grid Security - Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8448}, pages = {94--124}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10329-7\_7}, doi = {10.1007/978-3-319-10329-7\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridsec/BeckersFHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridsec/MoyanoGBH14, author = {Francisco Moyano and M. Carmen Fern{\'{a}}ndez Gago and Kristian Beckers and Maritta Heisel}, editor = {Jorge Cu{\'{e}}llar}, title = {Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements}, booktitle = {Smart Grid Security - Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8448}, pages = {166--180}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10329-7\_11}, doi = {10.1007/978-3-319-10329-7\_11}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridsec/MoyanoGBH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofsem/Beckers14, author = {Kristian Beckers}, editor = {Viliam Geffert and Bart Preneel and Branislav Rovan and Julius Stuller and A Min Tjoa}, title = {Goal-Based Establishment of an Information Security Management System Compliant to {ISO} 27001}, booktitle = {{SOFSEM} 2014: Theory and Practice of Computer Science - 40th International Conference on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}} Smokovec, Slovakia, January 26-29, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8327}, pages = {102--113}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04298-5\_10}, doi = {10.1007/978-3-319-04298-5\_10}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/sofsem/Beckers14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/BeckersFGHKM14, author = {Kristian Beckers and Stephan Fa{\ss}bender and Stefanos Gritzalis and Maritta Heisel and Christos Kalloniatis and Rene Meis}, editor = {Claudia Eckert and Sokratis K. Katsikas and G{\"{u}}nther Pernul}, title = {Privacy-Aware Cloud Deployment Scenario Selection}, booktitle = {Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8647}, pages = {94--105}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09770-1\_9}, doi = {10.1007/978-3-319-09770-1\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/BeckersFGHKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/BeckersCFHH14, author = {Kristian Beckers and Isabelle C{\^{o}}t{\'{e}} and Stefan Fenz and Denis Hatebur and Maritta Heisel}, editor = {Maritta Heisel and Wouter Joosen and Javier L{\'{o}}pez and Fabio Martinelli}, title = {A Structured Comparison of Security Standards}, booktitle = {Engineering Secure Future Internet Services and Systems - Current Research}, series = {Lecture Notes in Computer Science}, volume = {8431}, pages = {1--34}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07452-8\_1}, doi = {10.1007/978-3-319-07452-8\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/BeckersCFHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/BeckersHSS14, author = {Kristian Beckers and Maritta Heisel and Bj{\o}rnar Solhaug and Ketil St{\o}len}, editor = {Maritta Heisel and Wouter Joosen and Javier L{\'{o}}pez and Fabio Martinelli}, title = {{ISMS-CORAS:} {A} Structured Method for Establishing an {ISO} 27001 Compliant Information Security Management System}, booktitle = {Engineering Secure Future Internet Services and Systems - Current Research}, series = {Lecture Notes in Computer Science}, volume = {8431}, pages = {315--344}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07452-8\_13}, doi = {10.1007/978-3-319-07452-8\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/BeckersHSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/re/2014espre, editor = {Kristian Beckers and Shamal Faily and Seok{-}Won Lee and Nancy R. Mead}, title = {{IEEE} 1st Workshop on Evolving Security and Privacy Requirements Engineering, {ESPRE} 2014, 25 August, 2014, Karlskrona, Sweden}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6883269/proceeding}, isbn = {978-1-4799-6340-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/2014espre.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/BeckersCFHH13, author = {Kristian Beckers and Isabelle C{\^{o}}t{\'{e}} and Stephan Fa{\ss}bender and Maritta Heisel and Stefan Hofbauer}, title = {A pattern-based method for establishing a cloud-specific information security management system - Establishing information security management systems for clouds considering security, privacy, and legal compliance}, journal = {Requir. Eng.}, volume = {18}, number = {4}, pages = {343--395}, year = {2013}, url = {https://doi.org/10.1007/s00766-013-0174-7}, doi = {10.1007/S00766-013-0174-7}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/BeckersCFHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/BeckersCFHH13a, author = {Kristian Beckers and Isabelle C{\^{o}}t{\'{e}} and Stephan Fa{\ss}bender and Maritta Heisel and Stefan Hofbauer}, title = {Erratum to: {A} pattern-based method for establishing a cloud-specific information security management system}, journal = {Requir. Eng.}, volume = {18}, number = {4}, pages = {397}, year = {2013}, url = {https://doi.org/10.1007/s00766-013-0176-5}, doi = {10.1007/S00766-013-0176-5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/BeckersCFHH13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersHH13, author = {Kristian Beckers and Denis Hatebur and Maritta Heisel}, title = {A Problem-Based Threat Analysis in Compliance with Common Criteria}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {111--120}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.21}, doi = {10.1109/ARES.2013.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersFHP13, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Federica Paci}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods}, booktitle = {Availability, Reliability, and Security in Information Systems and {HCI} - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2013, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8127}, pages = {178--194}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40511-2\_13}, doi = {10.1007/978-3-642-40511-2\_13}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersFHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersHQW13, author = {Kristian Beckers and Stefan Hofbauer and Gerald Quirchmayr and Christopher C. Wills}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {A Method for Re-using Existing {ITIL} Processes for Creating an {ISO} 27001 {ISMS} Process Applied to a High Availability Video Conferencing Cloud Scenario}, booktitle = {Availability, Reliability, and Security in Information Systems and {HCI} - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2013, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8127}, pages = {224--239}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40511-2\_16}, doi = {10.1007/978-3-642-40511-2\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersHQW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersHCGG13, author = {Kristian Beckers and Maritta Heisel and Isabelle C{\^{o}}t{\'{e}} and Ludger Goeke and Selim G{\"{u}}ler}, title = {Structured Pattern-Based Security Requirements Elicitation for Clouds}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {465--474}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.61}, doi = {10.1109/ARES.2013.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersHCGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersH13, author = {Kristian Beckers and Maritta Heisel}, title = {A Usability Evaluation of the NESSoS Common Body of Knowledge}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {559--568}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.74}, doi = {10.1109/ARES.2013.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europlop/BeckersFH13, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel}, editor = {Uwe van Heesch and Christian Kohls}, title = {A meta-model for context-patterns}, booktitle = {Proceedings of the 18th European Conference on Pattern Languages of Program, EuroPLoP 2013, Irsee, Germany, July 10-14, 2013}, pages = {5:1--5:15}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2739011.2739016}, doi = {10.1145/2739011.2739016}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europlop/BeckersFH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/BeckersHFH13, author = {Kristian Beckers and Maritta Heisel and Thomas Frese and Denis Hatebur}, title = {A structured and model-based hazard analysis and risk assessment method for automotive systems}, booktitle = {{IEEE} 24th International Symposium on Software Reliability Engineering, {ISSRE} 2013, Pasadena, CA, USA, November 4-7, 2013}, pages = {238--247}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ISSRE.2013.6698923}, doi = {10.1109/ISSRE.2013.6698923}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/BeckersHFH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BeckersFHHC13, author = {Kristian Beckers and Stephan Fa{\ss}bender and Denis Hatebur and Maritta Heisel and Isabelle C{\^{o}}t{\'{e}}}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {Common criteria compliant software development {(CC-CASD)}}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {1298--1304}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480604}, doi = {10.1145/2480362.2480604}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/BeckersFHHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersEFHSS12, author = {Kristian Beckers and Stefan Eicker and Stephan Fa{\ss}bender and Maritta Heisel and Holger Schmidt and Widura Schwittek}, editor = {Gerald Quirchmayr and Josef Basl and Ilsun You and Lida Xu and Edgar R. Weippl}, title = {Ontology-Based Identification of Research Gaps and Immature Research Areas}, booktitle = {Multidisciplinary Research and Practice for Information Systems - {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, {CD-ARES} 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7465}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32498-7\_1}, doi = {10.1007/978-3-642-32498-7\_1}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersEFHSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersH12, author = {Kristian Beckers and Maritta Heisel}, editor = {Gerald Quirchmayr and Josef Basl and Ilsun You and Lida Xu and Edgar R. Weippl}, title = {A Foundation for Requirements Analysis of Privacy Preserving Software}, booktitle = {Multidisciplinary Research and Practice for Information Systems - {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, {CD-ARES} 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7465}, pages = {93--107}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32498-7\_8}, doi = {10.1007/978-3-642-32498-7\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersFHS12, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Holger Schmidt}, title = {Using Security Requirements Engineering Approaches to Support {ISO} 27001 Information Security Management Systems Development and Documentation}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {242--248}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.35}, doi = {10.1109/ARES.2012.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersFHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HofbauerBQ12, author = {Stefan Hofbauer and Kristian Beckers and Gerald Quirchmayr}, title = {A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {307--316}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.22}, doi = {10.1109/ARES.2012.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HofbauerBQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersFS12, author = {Kristian Beckers and Stephan Fa{\ss}bender and Holger Schmidt}, title = {An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {463--472}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.25}, doi = {10.1109/ARES.2012.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersFS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersF12, author = {Kristian Beckers and Stephan Fa{\ss}bender}, title = {Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and Performance}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {485--494}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.26}, doi = {10.1109/ARES.2012.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SchwittekSBEFH12, author = {Widura Schwittek and Holger Schmidt and Kristian Beckers and Stefan Eicker and Stephan Fa{\ss}bender and Maritta Heisel}, title = {A Common Body of Knowledge for Engineering Secure Software and Services}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {499--506}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.31}, doi = {10.1109/ARES.2012.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SchwittekSBEFH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Beckers12, author = {Kristian Beckers}, title = {Comparing Privacy Requirements Engineering Approaches}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {574--581}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.29}, doi = {10.1109/ARES.2012.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Beckers12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/BeckersFHM12, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Rene Meis}, editor = {Bart Preneel and Demosthenes Ikonomou}, title = {A Problem-Based Approach for Computer-Aided Privacy Threat Identification}, booktitle = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF} 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8319}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-54069-1\_1}, doi = {10.1007/978-3-642-54069-1\_1}, timestamp = {Sat, 19 Oct 2019 20:10:28 +0200}, biburl = {https://dblp.org/rec/conf/apf/BeckersFHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bir/HofbauerBQ12, author = {Stefan Hofbauer and Kristian Beckers and Gerald Quirchmayr}, editor = {Natalia Aseeva and Eduard Babkin and Oleg Kozyrev}, title = {Conducting a Privacy Impact Analysis for the Analysis of Communication Records}, booktitle = {Perspectives in Business Informatics Research - 11th International Conference, {BIR} 2012, Nizhny Novgorod, Russia, September 24-26, 2012. Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {128}, pages = {148--161}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33281-4\_12}, doi = {10.1007/978-3-642-33281-4\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bir/HofbauerBQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BeckersFHM12, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Rene Meis}, editor = {Maritta Heisel}, title = {Pattern-Based Context Establishment for Service-Oriented Architectures}, booktitle = {Software Service and Application Engineering - Essays Dedicated to Bernd Kr{\"{a}}mer on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {7365}, pages = {81--101}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30835-2\_7}, doi = {10.1007/978-3-642-30835-2\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BeckersFHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/BeckersFHKS12, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Jan{-}Christoph K{\"{u}}ster and Holger Schmidt}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {Supporting the Development and Documentation of {ISO} 27001 Information Security Management Systems through Security Requirements Engineering Approaches}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {14--21}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_2}, doi = {10.1007/978-3-642-28166-2\_2}, timestamp = {Sat, 19 Oct 2019 20:24:21 +0200}, biburl = {https://dblp.org/rec/conf/essos/BeckersFHKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refsq/BeckersFKS12, author = {Kristian Beckers and Stephan Fa{\ss}bender and Jan{-}Christoph K{\"{u}}ster and Holger Schmidt}, editor = {Bj{\"{o}}rn Regnell and Daniela E. Damian}, title = {A Pattern-Based Method for Identifying and Analyzing Laws}, booktitle = {Requirements Engineering: Foundation for Software Quality - 18th International Working Conference, {REFSQ} 2012, Essen, Germany, March 19-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7195}, pages = {256--262}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28714-5\_23}, doi = {10.1007/978-3-642-28714-5\_23}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/refsq/BeckersFKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/BeckersF12, author = {Kristian Beckers and Stephan Fa{\ss}bender}, editor = {Stefan J{\"{a}}hnichen and Bernhard Rumpe and Holger Schlingloff}, title = {Supporting the context establishment according to {ISO} 27005 using patterns}, booktitle = {Software Engineering 2012 - Workshopband, Fachtagung des GI-Fachbereichs Softwaretechnik, 27. Februar - 2. M{\"{a}}rz 2012 in Berlin}, series = {{LNI}}, volume = {{P-199}}, pages = {141--146}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18381}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/BeckersF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HofbauerBQS12, author = {Stefan Hofbauer and Kristian Beckers and Gerald Quirchmayr and Christoph Sorge}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {992--997}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.38}, doi = {10.1109/TRUSTCOM.2012.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HofbauerBQS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BeckersSKF11, author = {Kristian Beckers and Holger Schmidt and Jan{-}Christoph K{\"{u}}ster and Stephan Fa{\ss}bender}, title = {Pattern-Based Support for Context Establishment and Asset Identification of the {ISO} 27000 in the Field of Cloud Computing}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {327--333}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.55}, doi = {10.1109/ARES.2011.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BeckersSKF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BeckersJ10, author = {Kristian Beckers and Jan J{\"{u}}rjens}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Security and Compliance in Clouds}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {91--100}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_9}, doi = {10.1007/978-3-8348-9788-6\_9}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/BeckersJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SeedorfBH09, author = {Jan Seedorf and Kristian Beckers and Felipe Huici}, title = {Single-message denial-of-service attacks against voice-over-internet protocol terminals}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {2}, number = {1}, pages = {29--34}, year = {2009}, url = {https://doi.org/10.1504/IJESDF.2009.023873}, doi = {10.1504/IJESDF.2009.023873}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SeedorfBH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.