A serious game for eliciting social engineering security requirements K Beckers, S Pape 2016 IEEE 24th International Requirements Engineering Conference (RE), 16-25, 2016 | 127 | 2016 |
A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering … K Beckers, I Côté, S Faßbender, M Heisel, S Hofbauer Requirements Engineering 18, 343-395, 2013 | 80 | 2013 |
Pattern and Security Requirements K Beckers, M Heisel, D Hatebur Pattern Secur. Requir. Eng. Establ. Secur. Stand, 1-474, 2015 | 65 | 2015 |
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing K Beckers, H Schmidt, JC Kuster, S Faßbender 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 64 | 2011 |
Social engineering defence mechanisms and counteracting training strategies P Schaab, K Beckers, S Pape Information & Computer Security 25 (2), 206-222, 2017 | 60 | 2017 |
Comparing privacy requirements engineering approaches K Beckers 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 57 | 2012 |
A problem-based approach for computer-aided privacy threat identification K Beckers, S Faßbender, M Heisel, R Meis Privacy Technologies and Policy: First Annual Privacy Forum, APF 2012 …, 2014 | 51 | 2014 |
A lightweight threat analysis approach intertwining safety and security for the automotive domain J Dürrwang, K Beckers, R Kriesten Computer Safety, Reliability, and Security: 36th International Conference …, 2017 | 45 | 2017 |
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system K Beckers, M Heisel, B Solhaug, K Stølen Engineering Secure Future Internet Services and Systems: Current Research …, 2014 | 45 | 2014 |
Security attack analysis using attack patterns T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers 2016 IEEE Tenth International Conference on Research Challenges in …, 2016 | 41 | 2016 |
Towards continuous security compliance in agile software development at scale F Moyon, K Beckers, S Klepper, P Lachberger, B Bruegge Proceedings of the 4th International Workshop on Rapid Continuous Software …, 2018 | 37 | 2018 |
Analysis of social engineering threats with attack graphs K Beckers, L Krautsevich, A Yautsiukhin International Workshop on Data Privacy Management, 216-232, 2014 | 37 | 2014 |
A catalog of security requirements patterns for the domain of cloud computing systems K Beckers, I Côté, L Goeke Proceedings of the 29th Annual ACM Symposium on Applied Computing, 337-342, 2014 | 35 | 2014 |
Identifying relevant information cues for vulnerability assessment using CVSS L Allodi, S Banescu, H Femmer, K Beckers Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 34 | 2018 |
A structured and model-based hazard analysis and risk assessment method for automotive systems K Beckers, M Heisel, T Frese, D Hatebur 2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013 | 34 | 2013 |
Using security requirements engineering approaches to support ISO 27001 information security management systems development and documentation K Beckers, S Faßbender, M Heisel, H Schmidt 2012 seventh international conference on availability, reliability and …, 2012 | 31 | 2012 |
On the requirements for serious games geared towards software developers in the industry TE Gasiba, K Beckers, S Suppan, F Rezabek 2019 IEEE 27th International Requirements Engineering Conference (RE), 286-296, 2019 | 29 | 2019 |
PERSUADED: fighting social engineering attacks with a serious game D Aladawy, K Beckers, S Pape Trust, Privacy and Security in Digital Business: 15th International …, 2018 | 29 | 2018 |
Systematic derivation of functional safety requirements for automotive systems K Beckers, I Côté, T Frese, D Hatebur, M Heisel Computer Safety, Reliability, and Security: 33rd International Conference …, 2014 | 29 | 2014 |
A structured comparison of security standards K Beckers, I Côté, S Fenz, D Hatebur, M Heisel Engineering secure future internet services and systems: Current research, 1-34, 2014 | 29 | 2014 |