Kristian Beckers
TitleCited byYear
A pattern-based method for establishing a cloud-specific information security management system
K Beckers, I Côté, S Faßbender, M Heisel, S Hofbauer
Requirements Engineering 18 (4), 343-395, 2013
562013
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
K Beckers, H Schmidt, JC Kuster, S Faßbender
2011 Sixth International Conference on Availability, Reliability and …, 2011
482011
A serious game for eliciting social engineering security requirements
K Beckers, S Pape
2016 IEEE 24th International Requirements Engineering Conference (RE), 16-25, 2016
412016
A problem-based approach for computer-aided privacy threat identification
K Beckers, S Faßbender, M Heisel, R Meis
Annual Privacy Forum, 1-16, 2012
332012
Comparing privacy requirements engineering approaches
K Beckers
2012 Seventh International Conference on Availability, Reliability and …, 2012
322012
Pattern and Security Requirements
K Beckers, M Heisel, D Hatebur
Pattern Secur. Requir. Eng. Establ. Secur. Stand, 1-474, 2015
232015
A catalog of security requirements patterns for the domain of cloud computing systems
K Beckers, I Côté, L Goeke
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 337-342, 2014
212014
A pattern-based method for identifying and analyzing laws
K Beckers, S Faßbender, JC Küster, H Schmidt
International Working Conference on Requirements Engineering: Foundation for …, 2012
212012
Analysis of social engineering threats with attack graphs
K Beckers, L Krautsevich, A Yautsiukhin
Data privacy management, autonomous spontaneous security, and security …, 2014
202014
Security attack analysis using attack patterns
T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers
2016 IEEE Tenth International Conference on Research Challenges in …, 2016
192016
A structured and model-based hazard analysis and risk assessment method for automotive systems
K Beckers, M Heisel, T Frese, D Hatebur
2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013
192013
Structured pattern-based security requirements elicitation for clouds
K Beckers, M Heisel, I Côté, L Goeke, S Güler
2013 International Conference on Availability, Reliability and Security, 465-474, 2013
192013
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system
K Beckers, M Heisel, B Solhaug, K Stølen
Engineering Secure Future Internet Services and Systems, 315-344, 2014
182014
A problem-based threat analysis in compliance with common criteria
K Beckers, D Hatebur, M Heisel
2013 International Conference on Availability, Reliability and Security, 111-120, 2013
172013
An integrated method for pattern-based elicitation of legal requirements applied to a cloud computing example
K Beckers, S Faßbender, H Schmidt
2012 Seventh International Conference on Availability, Reliability and …, 2012
172012
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches
K Beckers, S Faßbender, M Heisel, JC Küster, H Schmidt
International Symposium on Engineering Secure Software and Systems, 14-21, 2012
162012
Common criteria compliant software development (CC-CASD)
K Beckers, S Faßbender, D Hatebur, M Heisel, I Côté
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1298-1304, 2013
152013
A threat analysis methodology for smart home scenarios
K Beckers, S Faßbender, M Heisel, S Suppan
International Workshop on Smart Grid Security, 94-124, 2014
142014
Using security requirements engineering approaches to support ISO 27001 information security management systems development and documentation
K Beckers, S Faßbender, M Heisel, H Schmidt
2012 Seventh International Conference on Availability, Reliability and …, 2012
142012
Social engineering defence mechanisms and counteracting training strategies
P Schaab, K Beckers, S Pape
Information & Computer Security 25 (2), 206-222, 2017
122017
The system can't perform the operation now. Try again later.
Articles 1–20