Kristian Beckers
According to our database1,
Kristian Beckers
authored at least 87 papers
between 2009 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Proceedings of the SOFSEM 2021: Theory and Practice of Computer Science, 2021
2020
A Light-Weight Tool for the Self-assessment of Security Compliance in Software Development - An Industry Case.
Proceedings of the SOFSEM 2020: Theory and Practice of Computer Science, 2020
Proceedings of the Product-Focused Software Process Improvement, 2020
How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale?
Proceedings of the Product-Focused Software Process Improvement, 2020
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020
Proceedings of the 7th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2020
2019
On the Requirements for Serious Games Geared Towards Software Developers in the Industry.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019
Preface Sixth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'19).
Proceedings of the 27th IEEE International Requirements Engineering Conference Workshops, 2019
Proceedings of the 27th IEEE International Requirements Engineering Conference Workshops, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
An Assessment Model for Continuous Security Compliance in Large Scale Agile Environments - Exploratory Paper.
Proceedings of the Advanced Information Systems Engineering, 2019
2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018
Proceedings of the 4th International Workshop on Rapid Continuous Software Engineering, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
A structured hazard analysis and risk assessment method for automotive systems - A descriptive study.
Reliab. Eng. Syst. Saf., 2017
A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interface.
Reliab. Eng. Syst. Saf., 2017
Informatikforschung für digitale Mobilitätsplattformen - Am Beispiel des TUM Living Lab Connected Mobility.
Inform. Spektrum, 2017
Inf. Comput. Secur., 2017
An Exploratory Survey of Hybrid Testing Techniques Involving Symbolic Execution and Fuzzing.
CoRR, 2017
Proceedings of the Proceedings 2nd International Workshop on Causal Reasoning for Embedded and safety-critical Systems Technologies, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
A Lightweight Threat Analysis Approach Intertwining Safety and Security for the Automotive Domain.
Proceedings of the Computer Safety, Reliability, and Security, 2017
Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment.
Proceedings of the Joint Proceedings of REFSQ-2017 Workshops, 2017
Erratum to: How Accountability is Implemented and Understood in Research Tools - A Systematic Mapping Study.
Proceedings of the Product-Focused Software Process Improvement, 2017
How Accountability is Implemented and Understood in Research Tools - A Systematic Mapping Study.
Proceedings of the Product-Focused Software Process Improvement, 2017
Proceedings of the 50 Jahre Universitäts-Informatik in München, 2017
2016
Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016
A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2016
Proceedings of the HCI 2016, 2016
2015
Int. J. Secur. Softw. Eng., 2015
A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface.
Proceedings of the Computer Safety, Reliability, and Security, 2015
Engineering trust- and reputation-based security controls for future internet systems.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015
Proceedings of the Eighth International i*Workshop, 2015
Proceedings of the Practice of Enterprise Modeling, 2015
Pattern and Security Requirements - Engineering-Based Establishment of Security Standards
Springer, ISBN: 978-3-319-16664-3, 2015
2014
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain.
Int. J. Secur. Softw. Eng., 2014
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Goal-Based Establishment of an Information Security Management System Compliant to ISO 27001.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014
Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements.
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis.
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Proceedings of the Computer Safety, Reliability, and Security, 2014
A catalog of security requirements patterns for the domain of cloud computing systems.
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Advanced Information Systems Engineering, 2014
2013
Erratum to: A pattern-based method for establishing a cloud-specific information security management system.
Requir. Eng., 2013
A pattern-based method for establishing a cloud-specific information security management system - Establishing information security management systems for clouds considering security, privacy, and legal compliance.
Requir. Eng., 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
A structured and model-based hazard analysis and risk assessment method for automotive systems.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013
Proceedings of the 18th European Conference on Pattern Languages of Program, 2013
A Method for Re-using Existing ITIL Processes for Creating an ISO 27001 ISMS Process Applied to a High Availability Video Conferencing Cloud Scenario.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013
2012
A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Software Engineering 2012 - Workshopband, Fachtagung des GI-Fachbereichs Softwaretechnik, 27. Februar, 2012
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012
Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
Proceedings of the Software Service and Application Engineering, 2012
Proceedings of the Perspectives in Business Informatics Research, 2012
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012
Proceedings of the Seventh International Conference on Availability, 2012
Proceedings of the Seventh International Conference on Availability, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example.
Proceedings of the Seventh International Conference on Availability, 2012
Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation.
Proceedings of the Seventh International Conference on Availability, 2012
Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and Performance.
Proceedings of the Seventh International Conference on Availability, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing.
Proceedings of the Sixth International Conference on Availability, 2011
2010
2009
Single-message denial-of-service attacks against voice-over-internet protocol terminals.
Int. J. Electron. Secur. Digit. Forensics, 2009