and other research outputs Using abuse frames to bound the scope of security prob-lem
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
We present a pattern system for security requirements en-gineering, consisting of security problem f...
Reducing defects in software is a central goal of modern software engineering. Providing essentially...
We are developing an approach using Jackson's Problem Frames to analyse security problems in order ...
Security problems arise from the concern for protecting assets from security threats. In a systems ...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
Abstract. In this paper, we present an approach using problem frames to analyse security problems in...
Purpose: Attempting to get access to a computer, computer network, or computing system without autho...
Abstract. We present several problem frames that serve to structure, character-ize and analyze softw...
Abstract. Detecting illegal resource access in the setting of grid computing is similar to the probl...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
Coding scheme for response and explanatory variables used in GLM analysis of cyber abuse.</p
Abstract. Within a multilevel secure (MLS) system, trusted subjects are granted privileges to perfor...
The widespread use of machine learning, including at critical information infrastructure facilities,...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
We present a pattern system for security requirements en-gineering, consisting of security problem f...
Reducing defects in software is a central goal of modern software engineering. Providing essentially...
We are developing an approach using Jackson's Problem Frames to analyse security problems in order ...
Security problems arise from the concern for protecting assets from security threats. In a systems ...
We are developing an approach using Jackson's Problem Frames to analyse security problems in or...
Abstract. In this paper, we present an approach using problem frames to analyse security problems in...
Purpose: Attempting to get access to a computer, computer network, or computing system without autho...
Abstract. We present several problem frames that serve to structure, character-ize and analyze softw...
Abstract. Detecting illegal resource access in the setting of grid computing is similar to the probl...
It is generally accepted that early determination of the stakeholder requirements assists in the dev...
Coding scheme for response and explanatory variables used in GLM analysis of cyber abuse.</p
Abstract. Within a multilevel secure (MLS) system, trusted subjects are granted privileges to perfor...
The widespread use of machine learning, including at critical information infrastructure facilities,...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
We present a pattern system for security requirements en-gineering, consisting of security problem f...
Reducing defects in software is a central goal of modern software engineering. Providing essentially...