Articles with public access mandates - Kristian BeckersLearn more
Not available anywhere: 3
Goal-based establishment of an information security management system compliant to ISO 27001
K Beckers
SOFSEM 2014: Theory and Practice of Computer Science: 40th International …, 2014
Mandates: European Commission
Deriving a pattern language syntax for context-patterns
K Beckers, S Fassbender, M Heisel
Proceedings of the 19th European Conference on Pattern Languages of Programs …, 2014
Mandates: German Research Foundation, European Commission
A meta-pattern and pattern form for context-patterns
K Beckers, S Faßbender, M Heisel, S Suppan
Proceedings of the 19th European Conference on Pattern Languages of Programs …, 2014
Mandates: German Research Foundation, European Commission
Available somewhere: 21
A problem-based approach for computer-aided privacy threat identification
K Beckers, S Faßbender, M Heisel, R Meis
Privacy Technologies and Policy: First Annual Privacy Forum, APF 2012 …, 2014
Mandates: European Commission
A lightweight threat analysis approach intertwining safety and security for the automotive domain
J Dürrwang, K Beckers, R Kriesten
Computer Safety, Reliability, and Security: 36th International Conference …, 2017
Mandates: Federal Ministry of Education and Research, Germany
Security attack analysis using attack patterns
T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers
2016 IEEE Tenth International Conference on Research Challenges in …, 2016
Mandates: Natural Sciences and Engineering Research Council of Canada, European Commission
Identifying relevant information cues for vulnerability assessment using CVSS
L Allodi, S Banescu, H Femmer, K Beckers
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
Mandates: Netherlands Organisation for Scientific Research
A catalog of security requirements patterns for the domain of cloud computing systems
K Beckers, I Côté, L Goeke
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 337-342, 2014
Mandates: European Commission
PERSUADED: fighting social engineering attacks with a serious game
D Aladawy, K Beckers, S Pape
Trust, Privacy and Security in Digital Business: 15th International …, 2018
Mandates: Federal Ministry of Education and Research, Germany
A structured comparison of security standards
K Beckers, I Côté, S Fenz, D Hatebur, M Heisel
Engineering secure future internet services and systems: Current research, 1-34, 2014
Mandates: European Commission
Systematic derivation of functional safety requirements for automotive systems
K Beckers, I Côté, T Frese, D Hatebur, M Heisel
Computer Safety, Reliability, and Security: 33rd International Conference …, 2014
Mandates: German Research Foundation, European Commission
Integration of security standards in devops pipelines: An industry case study
F Moyón, R Soares, M Pinto-Albuquerque, D Mendez, K Beckers
Product-Focused Software Process Improvement: 21st International Conference …, 2020
Mandates: Fundação para a Ciência e a Tecnologia, Portugal
PROTECT–an easy configurable serious game to train employees against social engineering attacks
L Goeke, A Quintanar, K Beckers, S Pape
International Workshop on Information and Operational Technology Security …, 2019
Mandates: European Commission
A threat analysis methodology for smart home scenarios
K Beckers, S Faßbender, M Heisel, S Suppan
Smart Grid Security: Second International Workshop, SmartGridSec 2014 …, 2014
Mandates: German Research Foundation, European Commission
Conceptualization of a cybersecurity awareness quiz
S Pape, L Goeke, A Quintanar, K Beckers
International workshop on model-driven simulation and training environments …, 2020
Mandates: European Commission
Trust-aware decision-making methodology for cloud sourcing
F Moyano, K Beckers, C Fernandez-Gago
International Conference on Advanced Information Systems Engineering, 136-149, 2014
Mandates: European Commission, Government of Spain
A structured method for security requirements elicitation concerning the cloud computing domain
K Beckers, I Côté, L Goeke, S Güler, M Heisel
International Journal of Secure Software Engineering (IJSSE) 5 (2), 20-43, 2014
Mandates: European Commission
A structured comparison of social engineering intelligence gathering tools
K Beckers, D Schosser, S Pape, P Schaab
Trust, Privacy and Security in Digital Business: 14th International …, 2017
Mandates: Federal Ministry of Education and Research, Germany
Analyzing attack strategies through anti-goal refinement
T Li, J Horkoff, E Paja, K Beckers, J Mylopoulos
The Practice of Enterprise Modeling: 8th IFIP WG 8.1. Working Conference …, 2015
Mandates: European Commission
Holistic security requirements analysis: An attacker's perspective
T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers
2015 IEEE 23rd International Requirements Engineering Conference (RE), 282-283, 2015
Mandates: European Commission
Publication and funding information is determined automatically by a computer program