Folgen
Yudistira Asnar
Titel
Zitiert von
Zitiert von
Jahr
Goal-driven risk assessment in requirements engineering
Y Asnar, P Giorgini, J Mylopoulos
Requirements Engineering 16 (2), 101-116, 2011
1472011
Modelling risk and identifying countermeasure in organizations
Y Asnar, P Giorgini
International Workshop on Critical Information Infrastructures Security, 55-66, 2006
1052006
From trust to dependability through risk analysis
Y Asnar, P Giorgini, F Massacci, N Zannone
The Second International Conference on Availability, Reliability and …, 2007
862007
Risk as dependability metrics for the evaluation of business solutions: a model-driven approach
Y Asnar, R Moretti, M Sebastianis, N Zannone
2008 Third International Conference on Availability, Reliability and …, 2008
402008
Analyzing business continuity through a multi-layers model
Y Asnar, P Giorgini
International Conference on Business Process Management, 212-227, 2008
392008
Perceived risk assessment
Y Asnar, N Zannone
Proceedings of the 4th ACM Workshop on Quality of Protection, 59-64, 2008
312008
Using risk analysis to evaluate design alternatives
Y Asnar, V Bryl, P Giorgini
International Workshop on Agent-Oriented Software Engineering, 140-155, 2006
282006
A method for security governance, risk, and compliance (GRC): a goal-process approach
Y Asnar, F Massacci
International School on Foundations of Security Analysis and Design, 152-184, 2011
272011
Secure and dependable patterns in organizations: An empirical approach
Y Asnar, P Giorgini, F Massacci, A Saidane, R Bonato, V Meduri, ...
15th IEEE International Requirements Engineering Conference (RE 2007), 287-292, 2007
262007
Risk analysis as part of the requirements engineering process
Y Asnar, P Giorgini
University of Trento, 2007
232007
Risk modelling and reasoning in goal models
Y Asnar, P Giorgini, J Mylopoulos
University of Trento, 2006
232006
Computer aided threat identification
Y Asnar, T Li, F Massacci, F Paci
2011 IEEE 13th Conference on Commerce and Enterprise Computing, 145-152, 2011
202011
A continuous fusion authentication for Android based on keystroke dynamics and touch gesture
AN Putri, YDW Asnar, S Akbar
2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016
182016
A vulnerability scanning tool for session management vulnerabilities
R Lukanta, Y Asnar, AI Kistijantoro
2014 International conference on data and software engineering (ICODSE), 1-6, 2014
152014
Applying tropos to socio-technical system design and runtime configuration
F Dalpiaz, R Ali, Y Asnar, V Bryl, P Giorgini
152008
Realizing Trustworthy Business Services Through a New GRC Approach
Y Asnar, HW Lim, F Massacci, C Worledge
ISACA - JOnline 2, 2010
10*2010
Reshaping software engineering education towards 2020 engineers
I Liem, Y Asnar, S Akbar, A Mulyanto, Y Widyani
2014 IEEE 27th Conference on Software Engineering Education and Training …, 2014
92014
An evaluation of business solutions in manufacturing enterprises
Y Asnar, P Giorgini, P Ciancarini, R Moretti, M Sebastianis, N Zannone
International Journal of Business Intelligence and Data Mining 3 (3), 305, 2008
92008
Rule generator for IPS by using honeypot to fight polymorphic worm
D Silalahi, Y Asnar, RS Perdana
2017 International Conference on Data and Software Engineering (ICoDSE), 1-5, 2017
82017
Web application fuzz testing
I Andrianto, MMI Liem, YDW Asnar
2017 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2017
82017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20