76 results on '"Yskout, Koen"'
Search Results
2. Ctam: A Tool for Continuous Threat Analysis and Management
3. Using provocative design to foster electronic informed consent innovation
4. Testing and Practical Implementation of a User-Friendly Personalized and Long-Term Electronic Informed Consent Prototype in Clinical Research: Mixed Methods Study
5. AndrAS: Automated Attack Surface Extraction for Android Applications
6. Empirical Assessment of Security Requirements and Architecture: Lessons Learned
7. Empirical Research on Security and Privacy by Design
8. Design notations for secure software: a systematic literature review
9. Requirements-Driven Runtime Reconfiguration for Security
10. The Security Twin Peaks
11. Systematic Elicitation of Common Security Design Flaws
12. A reimagined catalogue of software security patterns
13. Relationship-based threat modeling
14. Additional file 2 of Using provocative design to foster electronic informed consent innovation
15. Automated Threat Analysis and Management in a Continuous Integration Pipeline
16. Change patterns: Co-evolving requirements and architecture
17. Evolution of Security Engineering Artifacts
18. Empirical Assessment of Security Requirements and Architecture: Lessons Learned
19. Security and Privacy Requirements for Electronic Consent
20. Automating the early detection of security design flaws
21. Security Threat Modeling
22. Threat modeling
23. Towards Automated Security Design Flaw Detection
24. A Lingua Franca for Security by Design
25. Knowledge-enriched security and privacy threat modeling
26. Risk-based design security analysis
27. Security patterns 2.0
28. Solution-aware data flow diagrams for security threat modeling
29. Interaction-Based Privacy Threat Elicitation
30. SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment
31. A Model for Provably Secure Software Design
32. Towards a Platform for Empirical Software Design Studies
33. A Modular Meta-model for Security Solutions
34. Evolution of Security Engineering Artifacts
35. Towards systematically addressing security variability in software product lines
36. Connecting Security Requirements and Software Architecture with Patterns (Beveiligingsvereisten en softwarearchitectuur verbinden met patronen) : Connecting Security Requirements and Software Architecture with Patterns
37. SoSPa: A system of Security design Patterns for systematically engineering secure systems
38. Change patterns: Co-evolving requirements and architecture
39. MASC: Modelling Architectural Security Concerns
40. Do Security Patterns Really Help Designers?
41. Using change patterns to incorporate evolving trust relationships into a software architecture
42. Evolution of Security Engineering Artifacts
43. Security patterns: 10 years later
44. Architecting software with security patterns
45. Composing application models and security models: On the value of aspect-oriented technologies
46. Change patterns
47. Does organizing security patterns focus architectural choices?
48. Transforming Security Requirements into Architecture
49. An Analysis of the Security Patterns Landscape
50. Does Organizing Security Patterns Focus Architectural Choices?
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.