International journal of advanced research in computer science and software engineering S Roy, S Nag, IK Maitra, SK Bandyopadhyay International Journal 3 (6), 2013 | 40 | 2013 |
Testing production systems safely: Common precautions in penetration testing S Türpe, J Eichler 2009 Testing: Academic and Industrial Conference-Practice and Research …, 2009 | 22 | 2009 |
Monitoring security compliance of critical processes R Rieke, J Repp, M Zhdanova, J Eichler 2014 22nd Euromicro International Conference on Parallel, Distributed, and …, 2014 | 18 | 2014 |
Modular risk assessment for the development of secure automotive systems J Eichler, D Angermeier Proceedings of the 31st VDI/VW joint conference Automotive Security …, 2015 | 15 | 2015 |
Model-based Situational Security Analysis J Eichler, R Rieke 6th International Workshop on Models@run.time in conjunction with MODELS 2011, 2011 | 15 | 2011 |
Modeling security risk assessments D Angermeier, K Beilke, G Hansch, J Eichler Ruhr-Universität Bochum, 2019 | 14 | 2019 |
Lightweight modeling and analysis of security concepts J Eichler Engineering Secure Software and Systems: Third International Symposium …, 2011 | 11 | 2011 |
Security risk assessments: Modeling and risk level propagation D Angermeier, H Wester, K Beilke, G Hansch, J Eichler ACM Transactions on Cyber-Physical Systems 7 (1), 1-25, 2023 | 9 | 2023 |
Supporting risk assessment with the systematic identification, merging, and validation of security goals D Angermeier, A Nieding, J Eichler Risk Assessment and Risk-Driven Quality Assurance: 4th International …, 2017 | 8 | 2017 |
Systematic identification of security goals and threats in risk assessment D Angermeier, A Nieding, J Eichler Geselllschaft für Informatik eV, 2016 | 7 | 2016 |
Method selection and tailoring for agile threat assessment and mitigation S Renatus, C Teichmann, J Eichler 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 7 | 2015 |
Supporting security engineering at design time with adequate tooling J Eichler, A Fuchs, N Lincke 2012 IEEE 15th International Conference on Computational Science and …, 2012 | 7 | 2012 |
Risikobeurteilung in der IT-Sicherheit Kritischer Infrastrukturen-Eine Analyse der Risikobeurteilung im Förderschwerpunkt ITS| KRITIS T Gurschler, J Großmann, D Kotarski, C Teichmann, C Thim, J Eichler, ... | 5 | 2017 |
„Risk-driven Security Engineering in the Automotive Domain “ D Angermeier, J Eichler Embedded Security in Cars (escar USA), 2016 | 5 | 2016 |
Improving prioritization of software weaknesses using security models with AVUS S Renatus, C Bartelheimer, J Eichler 2015 IEEE 15th International Working Conference on Source Code Analysis and …, 2015 | 4 | 2015 |
Streamlining security relevance analysis according to ISO 21434 C Jakobs, B Naumann, M Werner, K Schmidt, J Eichler, H Heskamp 2022 5th International Conference on Networking, Information Systems and …, 2022 | 3 | 2022 |
Agile threat assessment and mitigation: an approach for method selection and tailoring C Teichmann, S Renatus, J Eichler International Journal of Secure Software Engineering (IJSSE) 7 (1), 1-16, 2016 | 3 | 2016 |
Model-based Security Engineering of Electronic Business Processes: A framework for security engineering in the domain of business process management JG Eichler Technische Universität München, 2015 | 3 | 2015 |
SecEPM: A security engineering process model for electronic business processes J Eichler 2012 IEEE Ninth International Conference on e-Business Engineering, 206-213, 2012 | 2 | 2012 |
Towards a Security Engineering Process Model for Electronic Business Processes J Eichler Ninth European Dependable Computing Conference - EDCC 2012, 2012 | 2 | 2012 |