CAIRIS model package to accompany 'Contextualisation of Data Flow Diagrams for security analysis' GraMSec 2020 paper. The model package can be loaded in CAIRIS via the System >> Import Model menu
This repository contains the dataset for my PhD thesis "Context-based Access Control and Attack Mode...
Dataset for Paper "Tool-Supported Software Architecture-Based Data Flow Analysis for Confidentiality...
Methods for security risk analysis are often based on structured brainstorming (e.g. what [21] calls...
CAIRIS models to accompany 'Visualising Personas as Goal Models to Find Security Tensions' Informati...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Understanding how to better elicit, specify, and manage requirements for secure and usable software ...
Flow diagram showing derivation of complete case study sample for base case model testing in Sudanes...
Flow diagram showing derivation of complete case study sample for base case model testing in PRIEST ...
<p>Graphical model resulting from information flow analysis based on CMI values. </p
The search for security has always been one of the motivations of humankind. Nowadays data systems a...
Designing usable and secure software is hard without tool-support. Given the importance of requireme...
<p>Flow chart process for data incorporation in dengue fever outbreak modelling.</p
Flow diagram showing derivation of complete case study sample for base case model training in Wester...
ModelTBBCGEngland is an R package that contains models, summarised data, and fitting scripts for a m...
This repository contains the dataset for my PhD thesis "Context-based Access Control and Attack Mode...
Dataset for Paper "Tool-Supported Software Architecture-Based Data Flow Analysis for Confidentiality...
Methods for security risk analysis are often based on structured brainstorming (e.g. what [21] calls...
CAIRIS models to accompany 'Visualising Personas as Goal Models to Find Security Tensions' Informati...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Data flow diagrams (DFDs) are popular for sketching systems for subsequent threat modelling. Their l...
Understanding how to better elicit, specify, and manage requirements for secure and usable software ...
Flow diagram showing derivation of complete case study sample for base case model testing in Sudanes...
Flow diagram showing derivation of complete case study sample for base case model testing in PRIEST ...
<p>Graphical model resulting from information flow analysis based on CMI values. </p
The search for security has always been one of the motivations of humankind. Nowadays data systems a...
Designing usable and secure software is hard without tool-support. Given the importance of requireme...
<p>Flow chart process for data incorporation in dengue fever outbreak modelling.</p
Flow diagram showing derivation of complete case study sample for base case model training in Wester...
ModelTBBCGEngland is an R package that contains models, summarised data, and fitting scripts for a m...
This repository contains the dataset for my PhD thesis "Context-based Access Control and Attack Mode...
Dataset for Paper "Tool-Supported Software Architecture-Based Data Flow Analysis for Confidentiality...
Methods for security risk analysis are often based on structured brainstorming (e.g. what [21] calls...