Search for persons
X
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
1
Creating Privacy Policies from Data-Flow Diagrams:
, In:
?
Lecture Notes in Computer Science; Applicable Formal Methods for Safe Industrial Products ,
2
Pattern-Based Risk Identification for Model-Based Risk Mana..:
, In:
?
Human-Centered Software Engineering; Lecture Notes in Computer Science ,
5
Meeting Strangers Online: Feature Models for Trustworthines..:
, In:
?
Proceedings of the 2022 European Symposium on Usable Security ,
7
ENAGRAM: An App to Evaluate Preventative Nudges for Instagr..:
, In:
?
Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science ,
8
PriPoCoG: Guiding Policy Authors to Define GDPR-Compliant P..:
, In:
?
Communications in Computer and Information Science; Evaluation of Novel Approaches to Software Engineering ,
9
The Relevance of Privacy Concerns, Trust, and Risk for Hybr..:
, In:
?
Communications in Computer and Information Science; Evaluation of Novel Approaches to Software Engineering ,
11
Risk Treatment: An Iterative Method for Identifying Control:
, In:
?
Communications in Computer and Information Science; Quality of Information and Communications Technology ,
12
Risk Identification Based on Architectural Patterns:
, In:
?
Communications in Computer and Information Science; Software Technologies ,
13
Model-Based Threat Modeling for Cyber-Physical Systems: A C..:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
14