Tuma, Katja
15  results:
Search for persons X
?
1

Automated Security Repair for Helm Charts:

, In: 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion),
 
?
3

On the Effects of Program Slicing for Vulnerability Detecti..:

, In: 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion),
Papotti, Aurora ; Massacci, Fabio ; Tuma, Katja - p. 368-369 , 2024
 
?
4

Does trainer gender make a difference when delivering phish..:

, In: Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering,
 
?
5

The Equality Maturity Model: An Actionable Tool to Advance ..:

, In: 2024 IEEE Global Engineering Education Conference (EDUCON),
 
?
6

On the Effects of Program Slicing for Vulnerability Detecti..:

, In: Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings,
Papotti, Aurora ; Massacci, Fabio ; Tuma, Katja - p. 368-369 , 2024
 
?
7

Automated Security Repair for Helm Charts:

, In: Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings,
 
?
8

The role of diversity in cybersecurity risk analysis : a..:

, In: Proceedings of the Third Workshop on Gender Equality, Diversity, and Inclusion in Software Engineering,
Tuma, Katja ; Van Der Lee, Romy - p. 12-18 , 2022
 
?
9

Towards a Security Stress-Test for Cloud Configurations:

, In: 2022 IEEE 15th International Conference on Cloud Computing (CLOUD),
Minna, Francesco ; Massacci, Fabio ; Tuma, Katja - p. 191-196 , 2022
 
?
10

The Role of Diversity in Cybersecurity Risk Analysis: An Ex..:

, In: 2022 IEEE/ACM 3rd International Workshop on Gender Equality, Diversity and Inclusion in Software Engineering (GEICSE),
Tuma, Katja ; Lee, Romy Van Der - p. 12-18 , 2022
 
?
11

Precise Analysis of Purpose Limitation in Data Flow Diagram:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
12

Automating the early detection of security design flaws:

, In: Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems,
 
?
13

Inspection guidelines to identify security design flaws:

, In: Proceedings of the 13th European Conference on Software Architecture - Volume 2,
 
?
14

Towards Automated Security Design Flaw Detection:

, In: 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW),
 
?
15

Two Architectural Threat Analysis Techniques Compared:

, In: Software Architecture; Lecture Notes in Computer Science,
Tuma, Katja ; Scandariato, Riccardo - p. 347-363 , 2018
 
1-15