Péter Kárpáti
According to our database1,
Péter Kárpáti
authored at least 23 papers
between 2005 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Applicability of AADL in modelling the overall I&C architecture of a nuclear power plant.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020
2018
Combined Assessment of Software Safety and Security Requirements: An Industrial Evaluation of the CHASSIS Method.
J. Cases Inf. Technol., 2018
2015
IEEE Trans. Software Eng., 2015
Investigating security threats in architectural context: Experimental evaluations of misuse case maps.
J. Syst. Softw., 2015
Investigating fulfilment of traceability requirements in a combined process for safety and security assessments.
Int. J. Crit. Comput. Based Syst., 2015
2014
Inf. Softw. Technol., 2014
2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks.
Int. J. Secur. Softw. Eng., 2012
Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012
A comparative review of i<sup>∗</sup>-based and use case-based security modelling initiatives.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2012
2011
Proceedings of the Sixth International Conference on Availability, 2011
Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations.
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010
Proceedings of the Practice of Enterprise Modeling - Third IFIP WG 8.1 Working Conference, 2010
Towards a Hacker Attack Representation Method.
Proceedings of the ICSOFT 2010, 2010
Proceedings of the Software and Data Technologies - 5th International Conference, 2010
2009
Proceedings of the Medical Informatics in a United and Healthy Europe - Proceedings of MIE 2009, The XXIInd International Congress of the European Federation for Medical Informatics, Sarajevo, Bosnia and Herzegovina, August 30, 2009
Query-based requirements engineering for health care information systems: Examples and prospects.
Proceedings of the ICSE Workshop on Software Engineering in Health Care, 2009
2008
Designing and scaling proactive, self-organizing video servers: a formal and a simulation model.
PhD thesis, 2008
2005
Client Behaviour Prediction in a Proactive Video Server.
Proceedings of the Internet and Multimedia Systems and Applications, 2005