Eliciting security requirements with misuse cases G Sindre, AL Opdahl Requirements engineering 10, 34-44, 2005 | 1499 | 2005 |
Ontological evaluation of the UML using the Bunge–Wand–Weber model AL Opdahl, B Henderson-Sellers Software and systems modeling 1, 43-67, 2002 | 287 | 2002 |
Templates for misuse case description G Sindre, AL Opdahl Proceedings of the 7th International Workshop on Requirements Engineering …, 2001 | 264 | 2001 |
Named entity extraction for knowledge graphs: A literature overview T Al-Moslmi, MG Ocaña, AL Opdahl, C Veres IEEE Access 8, 32862-32881, 2020 | 188 | 2020 |
Experimental comparison of attack trees and misuse cases for security threat identification AL Opdahl, G Sindre Information and Software Technology 51 (5), 916-932, 2009 | 175 | 2009 |
From expert discipline to common practice: a vision and research agenda for extending the reach of enterprise modeling K Sandkuhl, HG Fill, S Hoppenbrouwers, J Krogstie, F Matthes, A Opdahl, ... Business & Information Systems Engineering 60, 69-80, 2018 | 124 | 2018 |
A reuse-based approach to determining security requirements G Sindre, DG Firesmith, AL Opdahl Proc. 9th International Workshop on Requirements Engineering: Foundation for …, 2003 | 123 | 2003 |
Comparing risk identification techniques for safety and security requirements C Raspotnig, A Opdahl Journal of systems and software 86 (4), 1124-1151, 2013 | 120 | 2013 |
Research areas and challenges for mobile information systems J Krogstie, K Lyytinen, AL Opdahl, B Pernici, K Siau, K Smolander International Journal of Mobile Communications 2 (3), 220-234, 2004 | 118 | 2004 |
Capturing security requirements through misuse cases G Sindre, AL Opdahl NIK 2001, Norsk Informatikkonferanse 2001, http://www. nik. no/2001 74, 2001 | 112 | 2001 |
Ontological analysis of whole–part relationships in OO-models AL Opdahl, B Henderson-Sellers, F Barbier Information and Software Technology 43 (6), 387-399, 2001 | 103 | 2001 |
Grounding the OML metamodel in ontology AL Opdahl, B Henderson-Sellers Journal of Systems and Software 57 (2), 119-143, 2001 | 96 | 2001 |
The unified enterprise modelling language—overview and further work V Anaya, G Berio, M Harzallah, P Heymans, R Matulevičius, AL Opdahl, ... Computers in Industry 61 (2), 99-111, 2010 | 91 | 2010 |
Conceptual modelling in information systems engineering AL Opdahl Springer, 2007 | 71 | 2007 |
A template for defining enterprise modelling constructs AL Opdahl, B Henderson-Sellers Journal of Database Management (JDM) 15 (2), 39-73, 2004 | 62 | 2004 |
Understanding the determinants of business process modelling in organisations TR Eikebrokk, J Iden, DH Olsen, AL Opdahl Business Process Management Journal 17 (4), 639-662, 2011 | 58 | 2011 |
Responsible media technology and AI: challenges and research directions C Trattner, D Jannach, E Motta, I Costera Meijer, N Diakopoulos, M Elahi, ... AI and Ethics 2 (4), 585-594, 2022 | 47 | 2022 |
Generalization/specialization as a structuring mechanism for misuse cases G Sindre, AL Opdahl, GF Brevik Proceedings of the 2nd symposium on requirements engineering for information …, 2002 | 45 | 2002 |
An ontology for enterprise and information systems modelling AL Opdahl, G Berio, M Harzallah, R Matulevičius Applied Ontology 7 (1), 49-92, 2012 | 43 | 2012 |
Mobile Information Systems–Research Challenges on the Conceptual and Logical Level J Krogstie, K Lyytinen, A Opdahl, B Pernici, K Siau, K Smolander Advanced Conceptual Modeling Techniques: ER 2002 Workshops, ECDM, MobIMod …, 2003 | 42 | 2003 |