Publications

Export 15 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is I  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
Ivanova M.G, Probst C.W, Hansen R.R, Kammueller F..  2015.  Attack Tree Generation by Policy Invalidation. 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2015, Heraklion, Crete, Greece. 9311:249–259.
Ivanova M.G.  2016.  Modelling Socio-Technical Aspects of Organisational Security.
Ivanova M.G, Probst C.W, Hansen R.R, Kammüller F..  2013.  Externalizing Behaviour for Analysing System Models. Journal of Internet Services and Information Security. 3:52–62.
Ivanova M.G, Probst C.W, Hansen R.R, Kammueller F..  2015.  Transforming Graphical System Models To Graphical Attack Models. The Second International Workshop on Graphical Models for Security (GraMSec 2015), Verona, Italy. :1–15.
Ionita D..  2014.  Context-sensitive Information security Risk identification and evaluation techniques. 22nd IEEE International Requirements Engineering Conference (RE14), Karlskrona, Sweden. :485–488.
Ionita D., Kegel R.HP, Baltuta A., Wieringa R.J.  2016.  ArgueSecure: Out-of-the-box Risk Assessment. Proceedings of the 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), Beijing, China.
Ionita D., Bullee J.H, Wieringa R.J.  2014.  Argumentation-Based Security Requirements Elicitation: The Next Round. Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), Karlskrona, Sweden. :7–12.
Ionita D., Wieringa R.J, Gordijn J..  2016.  Automated Identification and Prioritization of Business Risks in e-service Networks. Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016, Bucharest, Romania. 247:547–560.
Ionita D., Wieringa R.J, Bullee J.H, Vasenev A..  2015.  Investigating the usability and utility of tangible modelling of socio-technical architectures.
Ionita D., Hartel P.H, Pieters W., Wieringa R.J.  2013.  Current established risk assessment methodologies and tools.
Ionita D., Wieringa R.J, Bullee J.H, Vasenev A..  2015.  Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. 34th International Conference, ER 2015, Stockholm, Sweden. 9381:558–565.
Ionita D., Koenen S.K, Wieringa R.J.  2014.  Modelling telecom fraud with e3value.
Ionita D., Kaidalova J., Vasenev A., Wieringa R.J.  2016.  A study on tangible participative enterprise modelling. ER 2016 Workshops AHA, MoBID, MORE-BI, MReBA, QMMQ, and WM2SP, Gifu, Japan, November 14-17, 2016, Proceedings, Gifu, Japan. 9975:139–148.
Ionita D., Wieringa R.J, Wolos L., Gordijn J., Pieters W..  2015.  Using Value Models for Business Risk Analysis in e-Service Networks. 8th IFIP WG 8.1. Working Conference, PoEM 2015, Valencia, Spain. 235:239–253.
Ionita D., Gordijn J., Yesuf A.S, Wieringa R.J.  2016.  Value-Driven Risk Analysis of Coordination Models. 9th IFIP WG 8.1. Working Conference, PoEM 2015, Proceedings, Skovde, Sweden. 267:102–116.