Secure systems development with UML J Jürjens Springer Science & Business Media, 2005 | 1153 | 2005 |
UMLsec: Extending UML for secure systems development J Jürjens International Conference on The Unified Modeling Language, 412-425, 2002 | 1086 | 2002 |
Data security and consumer trust in FinTech innovation in Germany H Stewart, J Jürjens Information & Computer Security 26 (1), 109-128, 2018 | 369 | 2018 |
Towards development of secure systems using UMLsec J Jürjens International Conference on Fundamental Approaches to Software Engineering …, 2001 | 236 | 2001 |
Comparing bug finding tools with reviews and tests S Wagner, J Jürjens, C Koller, P Trischberger Testing of Communicating Systems: 17th IFIP TC6/WG 6.1 International …, 2005 | 185 | 2005 |
Formal eavesdropping and its computational interpretation M Abadi, J Jürjens International Symposium on Theoretical Aspects of Computer Software, 82-94, 2001 | 183 | 2001 |
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec SH Houmb, S Islam, E Knauss, J Jürjens, K Schneider Requirements Engineering 15, 63-93, 2010 | 179 | 2010 |
An integrated security verification and security solution design trade-off analysis approach SH Houmb, G Georg, J Jurjens, R France Information Security and Ethics: Concepts, Methodologies, Tools, and …, 2008 | 154* | 2008 |
Sound methods and effective tools for model-based security engineering with UML J Jürjens Proceedings of the 27th international Conference on Software Engineering …, 2005 | 148 | 2005 |
Information security management and the human aspect in organizations H Stewart, J Jürjens Information & Computer Security 25 (5), 494-534, 2017 | 135 | 2017 |
Ids reference architecture model. industrial data space. version 2.0 B Otto, S Lohmann, S Steinbuss, A Teuscher, S Auer, M Boehmer, J Bohn, ... International Data Spaces Association, 2018 | 131 | 2018 |
Using UMLsec and goal trees for secure systems development J Jürjens Proceedings of the 2002 ACM symposium on Applied computing, 1026-1030, 2002 | 115 | 2002 |
Model-based security engineering of distributed information systems using UMLsec B Best, J Jurjens, B Nuseibeh 29th International Conference on Software Engineering (ICSE'07), 581-590, 2007 | 112 | 2007 |
Extracting and verifying cryptographic models from C protocol code by symbolic execution M Aizatulin, AD Gordon, J Jürjens Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 100 | 2011 |
Specification-based test generation for security-critical systems using mutations G Wimmel, J Jürjens Formal Methods and Software Engineering: 4th International Conference on …, 2002 | 95 | 2002 |
From goal‐driven security requirements engineering to secure design H Mouratidis, J Jurjens International Journal of Intelligent Systems 25 (8), 813-840, 2010 | 91 | 2010 |
Specification-based testing of firewalls J Jürjens, G Wimmel International Andrei Ershov Memorial Conference on Perspectives of System …, 2001 | 91 | 2001 |
Tools for secure systems development with UML J Jürjens, P Shabalin International Journal on Software Tools for Technology Transfer 9 (5), 527-544, 2007 | 86 | 2007 |
Automated verification of UMLsec models for security requirements J Jürjens, P Shabalin International Conference on the Unified Modeling Language, 365-379, 2004 | 81 | 2004 |
Secrecy-preserving refinement J Jürjens International Symposium of Formal Methods Europe, 135-152, 2001 | 81 | 2001 |