default search action
Nicolas Mayer
Person information
- affiliation: Luxembourg Institute of Science and Technology
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Letizia Lorusso, Miran Mosmondor, Andrej Grguric, Lara Toccafondi, Grazia D'Onofrio, Sergio Russo, Jure Lampe, Tarmo Pihl, Nicolas Mayer, Gianna Vignani, Isabelle Lesterpt, Lucie Vaamonde, Francesco Giuliani, Manuele Bonaccorsi, Carlo La Viola, Erika Rovini, Filippo Cavallo, Laura Fiorini:
Design and Evaluation of Personalized Services to Foster Active Aging: The Experience of Technology Pre-Validation in Italian Pilots. Sensors 23(2): 797 (2023) - 2020
- [c26]Nicolas Mayer, Jean-Sébastien Sottet:
Systemic Security Risks in the Telecommunications Sector: An Approach for Security and Integrity of Networks and Services. COMPLEXIS 2020: 72-79
2010 – 2019
- 2019
- [j3]Nicolas Mayer, Jocelyn Aubert, Eric Grandry, Christophe Feltus, Elio Goettelmann, Roel J. Wieringa:
An integrated conceptual model for information system security risk management supported by enterprise architecture management. Softw. Syst. Model. 18(3): 2285-2312 (2019) - 2018
- [c25]Jean-Michel Remiche, Jocelyn Aubert, Nicolas Mayer, David Petrocelli:
Evaluation of Cloud Computing Offers through Security Risks - An Industrial Case Study. CLOSER 2018: 338-345 - [c24]Eloïse Zehnder, Nicolas Mayer, Guillaume Gronier:
Evaluation of the Cognitive Effectiveness of the CORAS Modelling Language. ER Workshops 2018: 149-162 - 2017
- [c23]Nicolas Mayer, Christophe Feltus:
Evaluation of the risk and security overlay of archimate to model information system security risks. EDOC Workshops 2017: 106-116 - [c22]Andreas Ellervee, Raimundas Matulevicius, Nicolas Mayer:
A Comprehensive Reference Model for Blockchain-based Distributed Ledger Technology. ER Forum/Demos 2017: 306-319 - [c21]Mikhel Vunk, Nicolas Mayer, Raimundas Matulevicius:
A Framework for Assessing Organisational IT Governance, Risk and Compliance. SPICE 2017: 337-350 - [i2]Nicolas Mayer, Jocelyn Aubert, Eric Grandry, Christophe Feltus, Elio Goettelmann:
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF. CoRR abs/1701.01664 (2017) - 2016
- [c20]Yannick Naudet, Nicolas Mayer, Christophe Feltus:
Towards a Systemic Approach for Information Security Risk Management. ARES 2016: 177-186 - [c19]Nicolas Mayer, Jocelyn Aubert, Eric Grandry, Christophe Feltus:
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF. PoEM 2016: 353-361 - [c18]Yves Le Bray, Nicolas Mayer, Jocelyn Aubert:
Defining measurements for analyzing information security risk reports in the telecommunications sector. SAC 2016: 2189-2194 - [i1]Nicolas Mayer, Jocelyn Aubert, Hervé Cholez, Eric Grandry, Eric Dubois:
The TISRIM-Telco Toolset - An IT Regulatory Framework to Support Security Compliance in the Telecommunications Sector. ERCIM News 2016(107) (2016) - 2015
- [c17]Nicolas Mayer, Eric Grandry, Christophe Feltus, Elio Goettelmann:
Towards the ENTRI Framework: Security Risk Management Enhanced by the Use of Enterprise Architectures. CAiSE Workshops 2015: 459-469 - [c16]Nicolas Mayer, Béatrix Barafort, Michel Picard, Stéphane Cortina:
An ISO Compliant and Integrated Model for IT GRC (Governance, Risk Management and Compliance). EuroSPI 2015: 87-99 - 2014
- [c15]Nicolas Mayer, Jocelyn Aubert:
Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo). SIN 2014: 85 - [c14]Stéphane Cortina, Nicolas Mayer, Alain Renault, Béatrix Barafort:
Towards a Process Assessment Model for Management System Standards. SPICE 2014: 36-47 - [c13]Elio Goettelmann, Nicolas Mayer, Claude Godart:
Integrating Security Risk Management into Business Process Management for the Cloud. CBI (1) 2014: 86-93 - 2013
- [c12]Sergio Sousa, Diana Marosin, Khaled Gaaloul, Nicolas Mayer:
Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach. EDOC 2013: 81-90 - [c11]Nicolas Mayer, Jocelyn Aubert, Hervé Cholez, Eric Grandry:
Sector-Based Improvement of the Information Security Risk Management Process in the Context of Telecommunications Regulation. EuroSPI 2013: 13-24 - [c10]Elio Goettelmann, Nicolas Mayer, Claude Godart:
A general approach for a trusted deployment of a business process in clouds. MEDES 2013: 92-99 - [c9]Olivier Mangin, Nicolas Mayer, Béatrix Barafort, Patrick Heymans, Eric Dubois:
An Improvement of Process Reference Model Design and Validation Using Business Process Management. SPICE 2013: 73-83 - 2012
- [j2]Raimundas Matulevicius, Haralambos Mouratidis, Nicolas Mayer, Eric Dubois, Patrick Heymans:
Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management. J. Univers. Comput. Sci. 18(6): 816-844 (2012) - 2011
- [p2]Eric Dubois, Nicolas Mayer, André Rifaut:
Improving Risk-Based Security Analysis with /*. Social Modeling for Requirements Engineering 2011: 281-312 - 2010
- [c8]Thierry Valdevit, Nicolas Mayer:
A Gap Analysis Tool for SMEs Targeting ISO/IEC 27001 Compliance. ICEIS (3) 2010: 413-416 - [p1]Eric Dubois, Patrick Heymans, Nicolas Mayer, Raimundas Matulevicius:
A Systematic Approach to Define the Domain of Information System Security Risk Management. Intentional Perspectives on Information Systems Engineering 2010: 289-306
2000 – 2009
- 2009
- [b1]Nicolas Mayer:
Model-based Management of Information System Security Risk. Université de Namur, Belgium, 2009 - [c7]Baptiste Alcalde, Eric Dubois, Sjouke Mauw, Nicolas Mayer, Sasa Radomirovic:
Towards a Decision Model Based on Trust and Security Risk Management. AISC 2009: 61-69 - [c6]Thierry Valdevit, Nicolas Mayer, Béatrix Barafort:
Tailoring ISO/IEC 27001 for SMEs: A Guide to Implement an Information Security Management System in Small Settings. EuroSPI 2009: 201-212 - 2008
- [j1]Nicolas Mayer, Eric Dubois, Patrick Heymans, Raimundas Matulevicius:
Défis de la sécurité de l'information. Support à la gestion des risques de sécurité par les modèles. Ingénierie des Systèmes d Inf. 13(1): 37-74 (2008) - [c5]Raimundas Matulevicius, Nicolas Mayer, Patrick Heymans:
Alignment of Misuse Cases with Security Risk Management. ARES 2008: 1397-1404 - [c4]Raimundas Matulevicius, Nicolas Mayer, Haralambos Mouratidis, Eric Dubois, Patrick Heymans, Nicolas Genon:
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. CAiSE 2008: 541-555 - [c3]Nicolas Mayer, Eric Dubois, Raimundas Matulevicius, Patrick Heymans:
Towards a Measurement Framework for Security Risk Management. MODSEC@MoDELS 2008 - 2007
- [c2]Nicolas Mayer, Eric Dubois, André Rifaut:
Requirements Engineering for Improving Business/IT Alignment in Security Risk Management Methods. IESA 2007: 15-26 - [c1]Nicolas Mayer, Patrick Heymans, Raimundas Matulevicius:
Design of a Modelling Language for Information System Security Risk Management. RCIS 2007: 121-132
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint