Basel Katt
Orcid: 0000-0002-0177-9496
According to our database1,
Basel Katt
authored at least 75 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Artificial intelligence for system security assurance: A systematic literature review.
Int. J. Inf. Sec., February, 2025
J. Inf. Secur. Appl., 2025
2024
Exploring the role of assurance context in system security assurance evaluation: a conceptual model.
Inf. Comput. Secur., 2024
Expert Syst. Appl., 2024
IEEE Access, 2024
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
2023
A quantitative framework for security assurance evaluation and selection of cloud services: a case study.
Int. J. Inf. Sec., December, 2023
A quantitative security evaluation and analysis model for web applications based on OWASP application security verification standard.
Comput. Secur., December, 2023
Comput. Secur., May, 2023
Sensors, January, 2023
Proceedings of the 17th International Conference on Signal-Image Technology & Internet-Based Systems, 2023
Proceedings of the 34th Conference of Open Innovations Association, 2023
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
Developing Security Assurance Metrics to Support Quantitative Security Assurance Evaluation.
J. Cybersecur. Priv., August, 2022
Comput. Secur., 2022
Comput. Secur., 2022
Systematic Generation of XSS and SQLi Vulnerabilities in PHP as Test Cases for Static Code Analysis.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study.
Proceedings of the Augmented Cognition, 2022
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
2021
Serious games as a tool to model attack and defense scenarios for cyber-security exercises.
Comput. Secur., 2021
Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study.
Proceedings of the Augmented Cognition, 2021
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021
2020
UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices.
Sensors, 2020
Comput. Secur., 2020
Towards a Maturity Improvement Process - Systemically Closing the Socio-Technical Gap.
Proceedings of the 6th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2020), 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
2019
Inf., 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the Information Technology in Disaster Risk Reduction, 2019
Proceedings of the International Conference on Software Security and Assurance, 2019
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), 2019
Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security.
Proceedings of the Evaluation and Assessment on Software Engineering, 2019
Proceedings of the 5th Collaborative European Research Conference (CERC 2019), 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Learning Software Security in Context: An Evaluation in Open Source Software Development Environment.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the Sicherheit 2018, 2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain.
Proceedings of the EXplainable AI in Law Workshop co-located with the 31st International Conference on Legal Knowledge and Information Systems, 2018
A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018
An Ontology-Based Context Model for Managing Security Knowledge in Software Development.
Proceedings of the 23rd Conference of Open Innovations Association, 2018
Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, 2018
Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and Trends in Cybersecurity (ALEC 2018) co-located with the Association for the Advancement of Artificial Intelligence 2018 Fall Symposium Series (AAAI-FSS 2018), 2018
2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2015
Int. J. Softw. Tools Technol. Transf., 2015
2014
Int. J. Secur. Softw. Eng., 2014
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014
Proceedings of the 2014 IEEE International Conference on Healthcare Informatics, 2014
Factors of Access Control Management in Electronic Healthcare: The Patients' Perspective.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2012
Int. J. Comput. Model. Algorithms Medicine, 2012
Considering privacy and effectiveness of authorization policies for shared electronic health records.
Proceedings of the ACM International Health Informatics Symposium, 2012
Proceedings of the Trustworthy Eternal Systems via Evolving Software, Data and Knowledge, 2012
2011
Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing.
Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation, 2011
Proceedings of the Formal Methods for Components and Objects, 10th International Symposium, 2011
Proceedings of the Formal Methods for Components and Objects, 10th International Symposium, 2011
Proceedings of the Electronic Healthcare - 4th International Conference, 2011
2010
Proceedings of the perspeGKtive 2010, 2010
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010
Implementation of a Secure and Interoperable Generic e-Health Infrastructure for Shared Electronic Health Records based on IHE Integration Profiles.
Proceedings of the MEDINFO 2010, 2010
An Authoring Framework for Security Policies: A Use-Case within the Healthcare Domain.
Proceedings of the Electronic Healthcare - Third International Conference, 2010
Proceedings of the Seamless Care - Safe Care - The Challenges of Interoperability and Patient Safety in Health Care, 2010
2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
2008
A general obligation model and continuity: enhanced policy enforcement engine for usage control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the Electronic Healthcare, First International Conference, 2008