Search

Your search keyword '"Yskout, Koen"' showing total 76 results

Search Constraints

Start Over You searched for: Author "Yskout, Koen" Remove constraint Author: "Yskout, Koen"
76 results on '"Yskout, Koen"'

Search Results

1. Threat Modeling: A Rough Diamond or Fool’s Gold?

6. Empirical Assessment of Security Requirements and Architecture: Lessons Learned

10. The Security Twin Peaks

11. Systematic Elicitation of Common Security Design Flaws

17. Evolution of Security Engineering Artifacts

21. Security Threat Modeling

22. Threat modeling

34. Evolution of Security Engineering Artifacts

36. Connecting Security Requirements and Software Architecture with Patterns (Beveiligingsvereisten en softwarearchitectuur verbinden met patronen) : Connecting Security Requirements and Software Architecture with Patterns

38. Change patterns: Co-evolving requirements and architecture

41. Using change patterns to incorporate evolving trust relationships into a software architecture

42. Evolution of Security Engineering Artifacts

43. Security patterns: 10 years later

44. Architecting software with security patterns

45. Composing application models and security models: On the value of aspect-oriented technologies

46. Change patterns

50. Does Organizing Security Patterns Focus Architectural Choices?

Catalog

Books, media, physical & digital resources