Kristian Beckers
Kristian Beckers
Bestätigte E-Mail-Adresse bei in.tum.de
Titel
Zitiert von
Zitiert von
Jahr
A pattern-based method for establishing a cloud-specific information security management system
K Beckers, I Côté, S Faßbender, M Heisel, S Hofbauer
Requirements Engineering 18 (4), 343-395, 2013
642013
A serious game for eliciting social engineering security requirements
K Beckers, S Pape
2016 IEEE 24th International Requirements Engineering Conference (RE), 16-25, 2016
622016
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
K Beckers, H Schmidt, JC Kuster, S Faßbender
2011 Sixth International Conference on Availability, Reliability and …, 2011
572011
Pattern and Security Requirements
K Beckers, M Heisel, D Hatebur
Pattern Secur. Requir. Eng. Establ. Secur. Stand, 1-474, 2015
462015
A problem-based approach for computer-aided privacy threat identification
K Beckers, S Faßbender, M Heisel, R Meis
Annual Privacy Forum, 1-16, 2012
452012
Comparing privacy requirements engineering approaches
K Beckers
2012 Seventh International Conference on Availability, Reliability and …, 2012
452012
A catalog of security requirements patterns for the domain of cloud computing systems
K Beckers, I Côté, L Goeke
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 337-342, 2014
292014
Social engineering defence mechanisms and counteracting training strategies
P Schaab, K Beckers, S Pape
Information & Computer Security, 2017
282017
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system
K Beckers, M Heisel, B Solhaug, K Stølen
Engineering Secure Future Internet Services and Systems, 315-344, 2014
262014
Analysis of social engineering threats with attack graphs
K Beckers, L Krautsevich, A Yautsiukhin
Data privacy management, autonomous spontaneous security, and security …, 2014
252014
Security attack analysis using attack patterns
T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers
2016 IEEE Tenth International Conference on Research Challenges in …, 2016
242016
HATCH: hack and trick capricious humans–a serious game on social engineering
K Beckers, S Pape, V Fries
Proceedings of the 30th International BCS Human Computer Interaction …, 2016
222016
A pattern-based method for identifying and analyzing laws
K Beckers, S Faßbender, JC Küster, H Schmidt
International Working Conference on Requirements Engineering: Foundation for …, 2012
222012
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches
K Beckers, S Faßbender, M Heisel, JC Küster, H Schmidt
International Symposium on Engineering Secure Software and Systems, 14-21, 2012
222012
A lightweight threat analysis approach intertwining safety and security for the automotive domain
J Dürrwang, K Beckers, R Kriesten
International Conference on Computer Safety, Reliability, and Security, 305-319, 2017
212017
A structured and model-based hazard analysis and risk assessment method for automotive systems
K Beckers, M Heisel, T Frese, D Hatebur
2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013
212013
Structured pattern-based security requirements elicitation for clouds
K Beckers, M Heisel, I Côté, L Goeke, S Güler
2013 International Conference on Availability, Reliability and Security, 465-474, 2013
212013
Systematic derivation of functional safety requirements for automotive systems
K Beckers, I Côté, T Frese, D Hatebur, M Heisel
International Conference on Computer Safety, Reliability, and Security, 65-80, 2014
192014
A structured comparison of security standards
K Beckers, I Côté, S Fenz, D Hatebur, M Heisel
Engineering secure future internet services and systems, 1-34, 2014
192014
A problem-based threat analysis in compliance with common criteria
K Beckers, D Hatebur, M Heisel
2013 International Conference on Availability, Reliability and Security, 111-120, 2013
192013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20