default search action
Riccardo Scandariato
Person information
- affiliation: Hamburg University of Technology, Germany
- affiliation: University of Gothenburg, Sweden
- affiliation: Chalmers University of Technology, Sweden
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Quang-Cuong Bui, Ranindya Paramitha, Duc-Ly Vu, Fabio Massacci, Riccardo Scandariato:
APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities. Empir. Softw. Eng. 29(1): 18 (2024) - [j25]Mazen Mohamad, Jan-Philipp Steghöfer, Eric Knauss, Riccardo Scandariato:
Managing security evidence in safety-critical organizations. J. Syst. Softw. 214: 112082 (2024) - [j24]Nicolás E. Díaz Ferreyra, Melina C. Vidoni, Maritta Heisel, Riccardo Scandariato:
Cybersecurity discussions in Stack Overflow: a developer-centred analysis of engagement and self-disclosure behaviour. Soc. Netw. Anal. Min. 14(1): 16 (2024) - [j23]Uwe Zdun, Pierre-Jean Queval, Georg Simhandl, Riccardo Scandariato, Somik Chakravarty, Marjan Jelic, Aleksandar S. Jovanovic:
Detection Strategies for Microservice Security Tactics. IEEE Trans. Dependable Secur. Comput. 21(3): 1257-1273 (2024) - [c79]Clinton Cao, Simon Schneider, Nicolás E. Díaz Ferreyra, Sicco Verwer, Annibale Panichella, Riccardo Scandariato:
CATMA: Conformance Analysis Tool For Microservice Applications. ICSE Companion 2024: 59-63 - [c78]Nicolás E. Díaz Ferreyra, Mojtaba Shahin, Mansooreh Zahedi, Sodiq Quadri, Riccardo Scandariato:
What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study. MSR 2024: 704-715 - [c77]Simon Schneider, Ananya Saha, Emanuele Mezzi, Katja Tuma, Riccardo Scandariato:
Designing Secure AI-based Systems: a Multi-Vocal Literature Review. SecDev 2024: 13-19 - [c76]Simon Schneider, Nicolás E. Díaz Ferreyra, Pierre-Jean Quéval, Georg Simhandl, Uwe Zdun, Riccardo Scandariato:
How Dataflow Diagrams Impact Software Security Analysis: an Empirical Experiment. SANER 2024: 952-963 - [i24]Simon Schneider, Nicolás E. Díaz Ferreyra, Pierre-Jean Quéval, Georg Simhandl, Uwe Zdun, Riccardo Scandariato:
How Dataflow Diagrams Impact Software Security Analysis: an Empirical Experiment. CoRR abs/2401.04446 (2024) - [i23]Clinton Cao, Simon Schneider, Nicolás E. Díaz Ferreyra, Sicco Verwer, Annibale Panichella, Riccardo Scandariato:
CATMA: Conformance Analysis Tool For Microservice Applications. CoRR abs/2401.09838 (2024) - [i22]Nicolás E. Díaz Ferreyra, Mojtaba Shahin, Mansooreh Zahedi, Sodiq Quadri, Riccardo Scandariato:
What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study. CoRR abs/2401.12768 (2024) - [i21]Simon Schneider, Alexander Bakhtin, Xiaozhou Li, Jacopo Soldani, Antonio Brogi, Tomás Cerný, Riccardo Scandariato, Davide Taibi:
Comparison of Static Analysis Architecture Recovery Tools for Microservice Applications. CoRR abs/2403.06941 (2024) - [i20]Mazen Mohamad, Jan-Philipp Steghöfer, Eric Knauss, Riccardo Scandariato:
Managing Security Evidence in Safety-Critical Organizations. CoRR abs/2404.17332 (2024) - [i19]Catherine Tony, Nicolás E. Díaz Ferreyra, Markus Mutas, Salem Dhiff, Riccardo Scandariato:
Prompting Techniques for Secure Code Generation: A Systematic Investigation. CoRR abs/2407.07064 (2024) - [i18]Simon Schneider, Ananya Saha, Emanuele Mezzi, Katja Tuma, Riccardo Scandariato:
Designing Secure AI-based Systems: a Multi-Vocal Literature Review. CoRR abs/2407.18584 (2024) - 2023
- [j22]Simon Schneider, Riccardo Scandariato:
Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java. J. Syst. Softw. 202: 111722 (2023) - [j21]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking security compliance between models and code. Softw. Syst. Model. 22(1): 273-296 (2023) - [j20]Mazen Mohamad, Rodi Jolak, Örjan Askerdal, Jan-Philipp Steghöfer, Riccardo Scandariato:
CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems. ACM Trans. Cyber Phys. Syst. 7(1): 3:1-3:26 (2023) - [j19]Uwe Zdun, Pierre-Jean Queval, Georg Simhandl, Riccardo Scandariato, Somik Chakravarty, Marjan Jelic, Aleksandar S. Jovanovic:
Microservice Security Metrics for Secure Communication, Identity Management, and Observability. ACM Trans. Softw. Eng. Methodol. 32(1): 16:1-16:34 (2023) - [c75]Nicolás Emilio Díaz Ferreyra, Gautam Kishore Shahi, Catherine Tony, Stefan Stieglitz, Riccardo Scandariato:
Regret, Delete, (Do Not) Repeat: An Analysis of Self-Cleaning Practices on Twitter After the Outbreak of the COVID-19 Pandemic. CHI Extended Abstracts 2023: 246:1-246:7 - [c74]Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina C. Vidoni, Riccardo Scandariato:
Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms. CHASE 2023: 105-110 - [c73]Quang-Cuong Bui, Malte Laukötter, Riccardo Scandariato:
DockerCleaner: Automatic Repair of Security Smells in Dockerfiles. ICSME 2023: 160-170 - [c72]Simon Schneider, Tufan Özen, Michael Chen, Riccardo Scandariato:
microSecEnD: A Dataset of Security-Enriched Dataflow Diagrams for Microservice Applications. MSR 2023: 125-129 - [c71]Catherine Tony, Markus Mutas, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
LLMSecEval: A Dataset of Natural Language Prompts for Security Evaluations. MSR 2023: 588-592 - [d1]Nicolás E. Díaz Ferreyra, Gautam Kishore Shahi, Catherine Tony, Stefan Stieglitz, Riccardo Scandariato:
nicoediaz/RegretCovid: Initial Release. Zenodo, 2023 - [i17]Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina C. Vidoni, Riccardo Scandariato:
Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms. CoRR abs/2303.01822 (2023) - [i16]Nicolás E. Díaz Ferreyra, Gautam Kishore Shahi, Catherine Tony, Stefan Stieglitz, Riccardo Scandariato:
Regret, Delete, (Do Not) Repeat: An Analysis of Self-Cleaning Practices on Twitter After the Outbreak of the COVID-19 Pandemic. CoRR abs/2303.09135 (2023) - [i15]Catherine Tony, Markus Mutas, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
LLMSecEval: A Dataset of Natural Language Prompts for Security Evaluations. CoRR abs/2303.09384 (2023) - [i14]Simon Schneider, Riccardo Scandariato:
Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice Applications written in Java. CoRR abs/2304.12769 (2023) - 2022
- [j18]Rodi Jolak, Thomas Rosenstatter, Mazen Mohamad, Kim Strandberg, Behrooz Sangchoolie, Nasser Nowdehi, Riccardo Scandariato:
CONSERVE: A framework for the selection of techniques for monitoring containers security. J. Syst. Softw. 186: 111158 (2022) - [c70]Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl:
SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices. ARES 2022: 9:1-9:10 - [c69]Hanaa Alshareef, Katja Tuma, Sandro Stucki, Gerardo Schneider, Riccardo Scandariato:
Precise Analysis of Purpose Limitation in Data Flow Diagrams. ARES 2022: 17:1-17:11 - [c68]Kamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra, Julian Koch, Thorsten Schüppstuhl, Riccardo Scandariato:
STRIPED: A Threat Analysis Method for IoT Systems. ARES 2022: 96:1-96:6 - [c67]Anusha Bambhore Tukaram, Simon Schneider, Nicolás E. Díaz Ferreyra, Georg Simhandl, Uwe Zdun, Riccardo Scandariato:
Towards a Security Benchmark for the Architectural Design of Microservice Applications. ARES 2022: 116:1-116:7 - [c66]Catherine Tony, Mohana Balasubramanian, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot. EASE 2022: 276-281 - [c65]Rodi Jolak, Thomas Rosenstatter, Saif Aldaghistani, Riccardo Scandariato:
RIPOSTE: A Collaborative Cyber Attack Response Framework for Automotive Systems. SEAA 2022: 350-357 - [c64]Eduard Pinconschi, Quang-Cuong Bui, Rui Abreu, Pedro Adão, Riccardo Scandariato:
Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities. ISSTA 2022: 789-792 - [c63]Quang-Cuong Bui, Riccardo Scandariato, Nicolás E. Díaz Ferreyra:
Vul4J: A Dataset of Reproducible Java Vulnerabilities Geared Towards the Study of Program Repair Techniques. MSR 2022: 464-468 - [c62]Mazen Mohamad, Jan-Philipp Steghöfer, Alexander Åström, Riccardo Scandariato:
Identifying security-related requirements in regulatory documents based on cross-project classification. PROMISE 2022: 82-91 - [c61]Catherine Tony, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences. QRS 2022: 896-906 - [i13]Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl:
Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices. CoRR abs/2202.01612 (2022) - [i12]Catherine Tony, Mohana Balasubramanian, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot. CoRR abs/2205.06200 (2022) - [i11]Nicolás E. Díaz Ferreyra, Melina C. Vidoni, Maritta Heisel, Riccardo Scandariato:
Cybersecurity Discussions in Stack Overflow: A Developer-Centred Analysis of Engagement and Self-Disclosure Behaviour. CoRR abs/2207.01529 (2022) - [i10]Catherine Tony, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences. CoRR abs/2211.13498 (2022) - 2021
- [j17]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato:
Security assurance cases - state of the art of an emerging approach. Empir. Softw. Eng. 26(4): 70 (2021) - [j16]Katja Tuma, Christian Sandberg, Urban Thorsson, Mathias Widman, Thomas Herpel, Riccardo Scandariato:
Finding security threats that matter: Two industrial case studies. J. Syst. Softw. 179: 111003 (2021) - [j15]Tomasz Kosinski, Riccardo Scandariato, Morten Fjeld:
SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems. EAI Endorsed Trans. Security Safety 8(27): e1 (2021) - [c60]Ivan Pashchenko, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci:
Secure Software Development in the Era of Fluid Multi-party Open Software and Services. ICSE (NIER) 2021: 91-95 - [c59]Mazen Mohamad, Örjan Askerdal, Rodi Jolak, Jan-Philipp Steghöfer, Riccardo Scandariato:
Asset-driven Security Assurance Cases with Built-in Quality Assurance. EnCyCriS@ICSE 2021: 29-36 - [i9]Ivan Pashchenko, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci:
Secure Software Development in the Era of Fluid Multi-party Open Software and Services. CoRR abs/2103.03331 (2021) - [i8]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking Security Compliance between Models and Code. CoRR abs/2108.08579 (2021) - 2020
- [c58]Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato:
Security assurance cases for road vehicles: an industry perspective. ARES 2020: 29:1-29:6 - [c57]Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries:
Contextualisation of Data Flow Diagrams for Security Analysis. GraMSec@CSF 2020: 186-197 - [c56]Marvin Wyrich, Regina Hebig, Stefan Wagner, Riccardo Scandariato:
Perception and Acceptance of an Autonomous Refactoring Bot. ICAART (1) 2020: 303-310 - [c55]Katja Tuma, Laurens Sion, Riccardo Scandariato, Koen Yskout:
Automating the early detection of security design flaws. MoDELS 2020: 332-342 - [c54]Sven Peldszus, Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings. SE 2020: 51-52 - [c53]Stefan Carl Peiser, Ludwig Friborg, Riccardo Scandariato:
JavaScript Malware Detection Using Locality Sensitive Hashing. SEC 2020: 143-154 - [c52]Thomas Rosenstatter, Kim Strandberg, Rodi Jolak, Riccardo Scandariato, Tomas Olovsson:
REMIND: A Framework for the Resilient Design of Automotive Systems. SecDev 2020: 81-95 - [i7]Marvin Wyrich, Regina Hebig, Stefan Wagner, Riccardo Scandariato:
Perception and Acceptance of an Autonomous Refactoring Bot. CoRR abs/2001.02553 (2020) - [i6]Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato:
Security Assurance Cases for Road Vehicles: an Industry Perspective. CoRR abs/2003.14106 (2020) - [i5]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato:
Cross-project Classification of Security-related Requirements. CoRR abs/2003.14134 (2020) - [i4]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato:
Security Assurance Cases - State of the Art of an Emerging Approach. CoRR abs/2003.14151 (2020) - [i3]Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries:
Contextualisation of Data Flow Diagrams for security analysis. CoRR abs/2006.04098 (2020)
2010 – 2019
- 2019
- [c51]Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato:
Inspection guidelines to identify security design flaws. ECSA (Companion) 2019: 116-122 - [c50]Katja Tuma, Riccardo Scandariato, Musard Balliu:
Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis. ICSA 2019: 191-200 - [c49]Linda Erlenhov, Francisco Gomes de Oliveira Neto, Riccardo Scandariato, Philipp Leitner:
Current and future bots in software development. BotSE@ICSE 2019: 7-11 - [c48]Laurens Sion, Katja Tuma, Riccardo Scandariato, Koen Yskout, Wouter Joosen:
Towards Automated Security Design Flaw Detection. ASE Workshops 2019: 49-56 - [c47]Sven Peldszus, Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings. MoDELS 2019: 23-33 - [e5]Laurence Duchien, Anne Koziolek, Raffaela Mirandola, Elena Maria Navarro Martínez, Clément Quinton, Riccardo Scandariato, Patrizia Scandurra, Catia Trubiani, Danny Weyns:
Proceedings of the 13th European Conference on Software Architecture, ECSA 2019, Paris, France, September 9-13, 2019, Companion Proceedings (Proceedings Volume 2),. ACM 2019, ISBN 978-1-4503-7142-1 [contents] - [i2]Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato:
Inspection Guidelines to Identify Security Design Flaws. CoRR abs/1906.01961 (2019) - [i1]Katja Tuma, Christian Sandberg, Urban Thorsson, Mathias Widman, Riccardo Scandariato:
Finding Security Threats That Matter: An Industrial Case Study. CoRR abs/1910.03422 (2019) - 2018
- [j14]Katja Tuma, Gül Çalikli, Riccardo Scandariato:
Threat analysis of software systems: A systematic literature review. J. Syst. Softw. 144: 275-294 (2018) - [c46]Katja Tuma, Riccardo Scandariato:
Two Architectural Threat Analysis Techniques Compared. ECSA 2018: 347-363 - [c45]Thibaud Antignac, Riccardo Scandariato, Gerardo Schneider:
Privacy Compliance Via Model Transformations. EuroS&P Workshops 2018: 120-126 - [c44]Stefanie Jasser, Katja Tuma, Riccardo Scandariato, Matthias Riebisch:
Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process. ICISSP 2018: 438-446 - [c43]Riccardo Scandariato, Jennifer Horkoff, Robert Feldt:
Generative secure design, defined. ICSE (NIER) 2018: 1-4 - [c42]Alexander van Den Berghe, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
A Lingua Franca for Security by Design. SecDev 2018: 69-76 - 2017
- [j13]Alexander van Den Berghe, Riccardo Scandariato, Koen Yskout, Wouter Joosen:
Design notations for secure software: a systematic literature review. Softw. Syst. Model. 16(3): 809-831 (2017) - [j12]Jeffrey Stuckman, James Walden, Riccardo Scandariato:
The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models. IEEE Trans. Reliab. 66(1): 17-37 (2017) - [c41]Vasileios Theodorou, Ilias Gerostathopoulos, Sasan Amini, Riccardo Scandariato, Christian Prehofer, Miroslaw Staron:
Theta Architecture: Preserving the Quality of Analytics in Data-Driven Systems. ADBIS (Short Papers and Workshops) 2017: 186-198 - [c40]Katja Tuma, Riccardo Scandariato, Mathias Widman, Christian Sandberg:
Towards Security Threats that Matter. CyberICPS/SECPRE@ESORICS 2017: 47-62 - [c39]Bashar Nassar, Riccardo Scandariato:
Traceability Metrics as Early Predictors of Software Defects? ICSA 2017: 235-238 - [c38]Alexander van Den Berghe, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
A Model for Provably Secure Software Design. FormaliSE@ICSE 2017: 3-9 - [c37]Laurens Sion, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
A Modular Meta-model for Security Solutions. Programming 2017: 16:1-16:5 - 2016
- [c36]Mariano Ceccato, Riccardo Scandariato:
Static Analysis and Penetration Testing from the Perspective of Maintenance Teams. ESEM 2016: 25:1-25:6 - [c35]Aram Hovsepyan, Riccardo Scandariato, Wouter Joosen:
Is Newer Always Better?: The Case of Vulnerability Prediction Models. ESEM 2016: 26:1-26:6 - [c34]Thibaud Antignac, Riccardo Scandariato, Gerardo Schneider:
A Privacy-Aware Conceptual Model for Handling Personal Data. ISoLA (1) 2016: 942-957 - [c33]Miroslaw Staron, Riccardo Scandariato:
Data veracity in intelligent transportation systems: The slippery road warning scenario. Intelligent Vehicles Symposium 2016: 821-826 - [c32]Bashar Nassar, Ali Shahrokni, Riccardo Scandariato:
Traceability Data in Early Development Phases as an Enabler for Decision Support. XP Workshops 2016: 15 - 2015
- [j11]Riccardo Scandariato, Kim Wuyts, Wouter Joosen:
A descriptive study of Microsoft's threat modeling technique. Requir. Eng. 20(2): 163-180 (2015) - [c31]Laurens Sion, Koen Yskout, Alexander van Den Berghe, Riccardo Scandariato, Wouter Joosen:
MASC: Modelling Architectural Security Concerns. MiSE@ICSE 2015: 36-41 - [c30]Koen Yskout, Riccardo Scandariato, Wouter Joosen:
Do Security Patterns Really Help Designers? ICSE (1) 2015: 292-302 - [c29]Phu Hong Nguyen, Koen Yskout, Thomas Heyman, Jacques Klein, Riccardo Scandariato, Yves Le Traon:
SoSPa: A system of Security design Patterns for systematically engineering secure systems. MoDELS 2015: 246-255 - 2014
- [j10]Aram Hovsepyan, Riccardo Scandariato, Maximilian Steff, Wouter Joosen:
Design Churn as Predictor of Vulnerabilities? Int. J. Secur. Softw. Eng. 5(3): 16-31 (2014) - [j9]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [j8]Kim Wuyts, Riccardo Scandariato, Wouter Joosen:
Empirical evaluation of a privacy-focused threat modeling methodology. J. Syst. Softw. 96: 122-138 (2014) - [j7]Koen Yskout, Riccardo Scandariato, Wouter Joosen:
Change patterns - Co-evolving requirements and architecture. Softw. Syst. Model. 13(2): 625-648 (2014) - [j6]Riccardo Scandariato, James Walden, Aram Hovsepyan, Wouter Joosen:
Predicting Vulnerable Software Components via Text Mining. IEEE Trans. Software Eng. 40(10): 993-1006 (2014) - [c28]James Walden, Jeff Stuckman, Riccardo Scandariato:
Predicting Vulnerable Components: Software Metrics vs Text Mining. ISSRE 2014: 23-33 - [p1]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout, Fabio Massacci, Wouter Joosen:
Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Engineering Secure Future Internet Services and Systems 2014: 35-64 - 2013
- [j5]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Least privilege analysis in software architectures. Softw. Syst. Model. 12(2): 331-348 (2013) - [c27]Riccardo Scandariato, James Walden, Wouter Joosen:
Static analysis versus penetration testing: A controlled experiment. ISSRE 2013: 451-460 - [e4]Jan Jürjens, Benjamin Livshits, Riccardo Scandariato:
Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings. Lecture Notes in Computer Science 7781, Springer 2013, ISBN 978-3-642-36562-1 [contents] - 2012
- [j4]Bernard Spitz, Riccardo Scandariato, Wouter Joosen:
Extraction of an Architectural Model for Least Privilege Analysis. Int. J. Secur. Softw. Eng. 3(4): 27-44 (2012) - [c26]Koen Yskout, Riccardo Scandariato, Wouter Joosen:
Does organizing security patterns focus architectural choices? ICSE 2012: 617-627 - [c25]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Reusable Formal Models for Secure Software Architectures. WICSA/ECSA 2012: 41-50 - [e3]Gilles Barthe, Benjamin Livshits, Riccardo Scandariato:
Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings. Lecture Notes in Computer Science 7159, Springer 2012, ISBN 978-3-642-28165-5 [contents] - [e2]Alessandro Moschitti, Riccardo Scandariato:
Eternal Systems - First International Workshop, EternalS@FET 2011, Budapest, Hungary, May 3, 2011, Revised Selected Papers. Communications in Computer and Information Science 255, Springer 2012, ISBN 978-3-642-28032-0 [contents] - 2011
- [j3]Kim Wuyts, Riccardo Scandariato, Griet Verhenneman, Wouter Joosen:
Integrating Patient Consent in e-Health Access Control. Int. J. Secur. Softw. Eng. 2(2): 1-24 (2011) - [j2]Mina Deng, Kim Wuyts, Riccardo Scandariato, Bart Preneel, Wouter Joosen:
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1): 3-32 (2011) - [c24]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Wouter Joosen, Serge Demeyer:
Preserving Aspects via Automation: A Maintainability Study. ESEM 2011: 315-324 - [c23]Thomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt, Yijun Yu:
The Security Twin Peaks. ESSoS 2011: 167-180 - [c22]Koen Yskout, Olivier-Nathanael Ben David, Riccardo Scandariato, Benoit Baudry:
Requirements-Driven Runtime Reconfiguration for Security. EternalS@FET 2011: 25-33 - [c21]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Composition of least privilege analysis results in software architectures (position paper). SESS@ICSE 2011: 29-35 - 2010
- [c20]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
From aspect-oriented models to aspect-oriented code?: the maintenance perspective. AOSD 2010: 85-96 - [c19]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Security in Context: Analysis and Refinement of Software Architectures. COMPSAC 2010: 161-170 - [c18]Riccardo Scandariato, Koen Buyens, Wouter Joosen:
Automated Detection of Least Privilege Violations in Software Architectures. ECSA 2010: 150-165 - [c17]Riccardo Scandariato, Fabio Massacci:
SecureChange: Security Engineering for Lifelong Evolvable Systems. ISoLA (2) 2010: 9-12
2000 – 2009
- 2009
- [j1]Bart De Win, Riccardo Scandariato, Koen Buyens, Johan Grégoire, Wouter Joosen:
On the secure software development process: CLASP, SDL and Touchpoints compared. Inf. Softw. Technol. 51(7): 1152-1171 (2009) - [c16]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Risk-Driven Architectural Decomposition. ARES 2009: 363-368 - [c15]Kim Wuyts, Riccardo Scandariato, Bart De Decker, Wouter Joosen:
Linking Privacy Solutions to Developer Goals. ARES 2009: 847-852 - [c14]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Measuring the interplay of security principles in software architectures. ESEM 2009: 554-563 - 2008
- [c13]Kim Wuyts, Riccardo Scandariato, Geert Claeys, Wouter Joosen:
Hardening XDS-Based Architectures. ARES 2008: 18-25 - [c12]Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi:
Application-Oriented Trust in Distributed Computing. ARES 2008: 434-439 - [c11]Thomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen:
Using Security Patterns to Combine Security Metrics. ARES 2008: 1156-1163 - [c10]Koen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen:
Transforming Security Requirements into Architecture. ARES 2008: 1421-1428 - [c9]Eryk Kylikowski, Riccardo Scandariato, Wouter Joosen:
Using Multi-Level Security Annotations to Improve Software Assurance. HASE 2008: 471-474 - [c8]Mina Deng, Riccardo Scandariato, Danny De Cock, Bart Preneel, Wouter Joosen:
Identity in federated electronic healthcare. Wireless Days 2008: 1-5 - [e1]Riccardo Scandariato, Giovanni Russello:
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008. ACM 2008, ISBN 978-1-60558-363-1 [contents] - 2007
- [c7]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Process Activities Supporting Security Principles. COMPSAC (2) 2007: 281-292 - [c6]Johan Grégoire, Koen Buyens, Bart De Win, Riccardo Scandariato, Wouter Joosen:
On the Secure Software Development Process: CLASP and SDL Compared. SESS@ICSE 2007: 1 - [c5]Thomas Heyman, Koen Yskout, Riccardo Scandariato, Wouter Joosen:
An Analysis of the Security Patterns Landscape. SESS@ICSE 2007: 3 - 2006
- [c4]Paolo Falcarin, Riccardo Scandariato, Mario Baldi:
Remote Trust with Aspect-Oriented Programming. AINA (1) 2006: 451-458 - [c3]Riccardo Scandariato, Bart De Win, Wouter Joosen:
Towards a measuring framework for security properties of software. QoP 2006: 27-30 - 2004
- [b1]Riccardo Scandariato:
Plicy-based solutions for distributed systems. Polytechnic University of Turin, Italy, 2004 - [c2]Riccardo Scandariato, John C. Knight:
The Design and Evaluation of a Defense System for Internet Worms. SRDS 2004: 164-173 - 2002
- [c1]Riccardo Scandariato, Fulvio Risso, Patricia Lago:
LMAP: a protocol to automate the setup of logical networks. ICON 2002: 461-466
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint