Publications

Export 19 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is I  [Clear All Filters]
2016
Ionita D., Kegel R.HP, Baltuta A., Wieringa R.J.  2016.  ArgueSecure: Out-of-the-box Risk Assessment. Proceedings of the 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), Beijing, China.
Ionita D., Wieringa R.J, Gordijn J..  2016.  Automated Identification and Prioritization of Business Risks in e-service Networks. Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016, Bucharest, Romania. 247:547–560.
Ivanova M.G.  2016.  Modelling Socio-Technical Aspects of Organisational Security.
Ionita D., Kaidalova J., Vasenev A., Wieringa R.J.  2016.  A study on tangible participative enterprise modelling. ER 2016 Workshops AHA, MoBID, MORE-BI, MReBA, QMMQ, and WM2SP, Gifu, Japan, November 14-17, 2016, Proceedings, Gifu, Japan. 9975:139–148.
Ionita D., Gordijn J., Yesuf A.S, Wieringa R.J.  2016.  Value-Driven Risk Analysis of Coordination Models. 9th IFIP WG 8.1. Working Conference, PoEM 2015, Proceedings, Skovde, Sweden. 267:102–116.
2015
Ivanova M.G, Probst C.W, Hansen R.R, Kammueller F..  2015.  Attack Tree Generation by Policy Invalidation. 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2015, Heraklion, Crete, Greece. 9311:249–259.
Ionita D., Wieringa R.J, Bullee J.H, Vasenev A..  2015.  Investigating the usability and utility of tangible modelling of socio-technical architectures.
Aslanyan Z., Ivanova M.G, Nielson F., Probst C.W.  2015.  Modeling and Analysing Socio-Technical Systems. 1st International Workshop on Socio-Technical Perspective in IS development (STPIS), Stockholm, Sweden. 1374:121–124.
Ionita D., Wieringa R.J, Bullee J.H, Vasenev A..  2015.  Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group. 34th International Conference, ER 2015, Stockholm, Sweden. 9381:558–565.
Nidd M., Ivanova M.G, Probst C.W, Tanner A..  2015.  Tool-based Risk Assessment of Cloud Infrastructures as Socio-Technical Systems. The Cloud Security Ecosystem. :495–517.
Ivanova M.G, Probst C.W, Hansen R.R, Kammueller F..  2015.  Transforming Graphical System Models To Graphical Attack Models. The Second International Workshop on Graphical Models for Security (GraMSec 2015), Verona, Italy. :1–15.
Ionita D., Wieringa R.J, Wolos L., Gordijn J., Pieters W..  2015.  Using Value Models for Business Risk Analysis in e-Service Networks. 8th IFIP WG 8.1. Working Conference, PoEM 2015, Valencia, Spain. 235:239–253.
2014
Ionita D., Bullee J.H, Wieringa R.J.  2014.  Argumentation-Based Security Requirements Elicitation: The Next Round. Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), Karlskrona, Sweden. :7–12.
Ionita D..  2014.  Context-sensitive Information security Risk identification and evaluation techniques. 22nd IEEE International Requirements Engineering Conference (RE14), Karlskrona, Sweden. :485–488.
Boender J., Ivanova M.G, Kammüller F., Primierio G..  2014.  Modeling Human Behaviour with Higher Order Logic: Insider Threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST), Vienna, Austria. :31–39.
Ionita D., Koenen S.K, Wieringa R.J.  2014.  Modelling telecom fraud with e3value.
2013
Ionita D., Hartel P.H, Pieters W., Wieringa R.J.  2013.  Current established risk assessment methodologies and tools.
Ivanova M.G, Probst C.W, Hansen R.R, Kammüller F..  2013.  Externalizing Behaviour for Analysing System Models. Journal of Internet Services and Information Security. 3:52–62.
Prakken H., Ionita D., Wieringa R.J.  2013.  Risk assessment as an argumentation game. 14th International Workshop on Computational Logic in Multi-Agent Systems, CLIMA XIV, Corunna, Spain. 8143:357–373.