Search for persons
X
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
1
Creating Privacy Policies from Data-Flow Diagrams:
, In:
?
Lecture Notes in Computer Science; Applicable Formal Methods for Safe Industrial Products ,
2
Pattern-Based Risk Identification for Model-Based Risk Mana..:
, In:
?
Human-Centered Software Engineering; Lecture Notes in Computer Science ,
3
Meeting Strangers Online: Feature Models for Trustworthines..:
, In:
?
Communications in Computer and Information Science; Evaluation of Novel Approaches to Software Engineering ,
4
The Relevance of Privacy Concerns, Trust, and Risk for Hybr..:
, In:
?
Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science ,
5
PriPoCoG: Guiding Policy Authors to Define GDPR-Compliant P..:
, In:
?
Proceedings of the 2022 European Symposium on Usable Security ,
6
ENAGRAM: An App to Evaluate Preventative Nudges for Instagr..:
, In:
?
Communications in Computer and Information Science; Evaluation of Novel Approaches to Software Engineering ,
7
Risk Treatment: An Iterative Method for Identifying Control:
, In:
?
Communications in Computer and Information Science; Software Technologies ,
8
Model-Based Threat Modeling for Cyber-Physical Systems: A C..:
, In:
?
Communications in Computer and Information Science; Quality of Information and Communications Technology ,
9
Risk Identification Based on Architectural Patterns:
, In:
?
Communications in Computer and Information Science; Software Technologies ,
10
Distributed Frames: Pattern-Based Characterization of Funct..:
, In:
?
Lecture Notes in Computer Science; Risks and Security of Internet and Systems ,
11
Systematic Asset Identification and Modeling During Require..:
, In:
?
International Conference on Social Media and Society ,
12
Building Trustworthiness in Computer-Mediated Introduction:..:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
13
Balancing trust and privacy in computer-mediated introducti..:
, In:
?
Communications in Computer and Information Science; Evaluation of Novel Approaches to Software Engineering ,
14