Christian Raspotnig

According to our database1, Christian Raspotnig authored at least 13 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Investigating operative cybersecurity awareness in air traffic control.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

2018
Combined Assessment of Software Safety and Security Requirements: An Industrial Evaluation of the CHASSIS Method.
J. Cases Inf. Technol., 2018

2015
Investigating fulfilment of traceability requirements in a combined process for safety and security assessments.
Int. J. Crit. Comput. Based Syst., 2015

2013
Comparing risk identification techniques for safety and security requirements.
J. Syst. Softw., 2013

Applying a Security Conceptual Model for Coverage Analysis.
Proceedings of the 7th IFAC Conference on Manufacturing Modelling, Management, and Control, 2013

Enhancing CHASSIS: A Method for Combining Safety and Security.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Requirements Management in a Combined Process for Safety and Security Assessments.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Improving Security and Safety Modelling with Failure Sequence Diagrams.
Int. J. Secur. Softw. Eng., 2012

Supporting Failure Mode and Effect Analysis: A Case Study with Failure Sequence Diagrams.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012

A Combined Process for Elicitation and Analysis of Safety and Security Requirements.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2012

2010
Erratum to "Means-ends and whole-part traceability analysis of safety requirements" [J. Syst. Software 83 (2010) 1612-1621].
J. Syst. Softw., 2010

Means-ends and whole-part traceability analysis of safety requirements.
J. Syst. Softw., 2010

Comparing Two Techniques for Intrusion Visualization.
Proceedings of the Practice of Enterprise Modeling - Third IFIP WG 8.1 Working Conference, 2010


  Loading...