Raimundas Matulevicius
Orcid: 0000-0002-1829-4794Affiliations:
- University of Tartu, Estonia
According to our database1,
Raimundas Matulevicius
authored at least 141 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
2024
Data Knowl. Eng., January, 2024
Comput. Stand. Interfaces, January, 2024
Complex Syst. Informatics Model. Q., 2024
Proceedings of the IEEE International Conference on Software Analysis, 2024
Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design.
Proceedings of the Research Challenges in Information Science, 2024
The Power of Many: Securing Organisational Identity Through Distributed Key Management.
Proceedings of the Advanced Information Systems Engineering, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
J. Inf. Secur. Appl., August, 2023
J. Univers. Comput. Sci., July, 2023
J. Inf. Secur. Appl., March, 2023
Informatics Educ., 2023
On the Shift to Decentralised Identity Management in Distributed Data Exchange Systems.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Proceedings of the Research Challenges in Information Science: Information Science and the Connected World, 2023
Developing a Blueprint for Vocational Qualification of Blockchain Specialists Under the European CHAISE Initiative.
Proceedings of the Systems, Software and Services Process Improvement, 2023
A Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture.
Proceedings of the Advanced Information Systems Engineering, 2023
Proceedings of the Perspectives in Business Informatics Research, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
ACM Comput. Surv., January, 2022
Int. J. Softw. Tools Technol. Transf., 2022
Privacy-preserving solution for vehicle parking services complying with EU legislation.
PeerJ Comput. Sci., 2022
Information Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle Interaction.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Ontological Representation of Healthcare Application Security Using Blockchain Technology.
Informatica, 2022
Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital Twins.
CoRR, 2022
Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins.
Comput. Ind., 2022
IEEE Access, 2022
Proceedings of the Research Challenges in Information Science, 2022
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering Education and Training, 2022
BPMN4FRSS: An BPMN Extension to Support Risk-Based Development of Forensic-Ready Software Systems.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2022
Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Securing Cyber-Physical Systems Through Blockchain-Based Digital Twins and Threat Intelligence.
CoRR, 2021
BlockNet Report: Exploring the Blockchain Skills Concept and Best Practice Use Cases.
CoRR, 2021
IEEE Access, 2021
Proceedings of the Forum at Practice of Enterprise Modeling 2021 (PoEM-Forum 2021) (PoEM 2021), 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the Intelligent Information Systems - CAiSE Forum 2021, Melbourne, VIC, Australia, June 28, 2021
Blockchain as a Countermeasure Solution for Security Threats of Healthcare Applications.
Proceedings of the Business Process Management: Blockchain and Robotic Process Automation Forum, 2021
Development of the Information Security Management System Standard for Public Sector Organisations in Estonia.
Proceedings of the 24th International Conference on Business Information Systems, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Interdisciplinary Blockchain Education: Utilizing Blockchain Technology From Various Perspectives.
Frontiers Blockchain, 2020
Balt. J. Mod. Comput., 2020
Balt. J. Mod. Comput., 2020
Proceedings of the Collaboration Technologies and Social Computing, 2020
Proceedings of the Advanced Information Systems Engineering, 2020
Proceedings of the Business Process Management: Blockchain and Robotic Process Automation Forum, 2020
Proceedings of the Databases and Information Systems, 2020
2019
Softw. Syst. Model., 2019
Inform. Spektrum, 2019
Complex Syst. Informatics Model. Q., 2019
Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns.
Comput. Secur., 2019
Security Risk Management in Cooperative Intelligent Transportation Systems: A Systematic Literature Review.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Conferences, 2019
Proceedings of the Fundamental Approaches to Software Engineering, 2019
Proceedings of the Advanced Information Systems Engineering Workshops, 2019
Proceedings of the Business Process Management: Blockchain and Central and Eastern Europe Forum, 2019
Proceedings of the Joint Proceedings of the BIR 2019 Workshops and Doctoral Consortium co-located with 18th International Conference on Perspectives in Business Informatics Research (BIR 2019), 2019
2018
Bus. Inf. Syst. Eng., 2018
An Empirical Evaluation of the Requirements Engineering Tool for Socio-Technical Systems.
Proceedings of the 7th IEEE International Workshop on Empirical Requirements Engineering, 2018
Proceedings of the Perspectives in Business Informatics Research, 2018
Proceedings of the Joint Proceedings of the BIR 2018 Short Papers, 2018
Proceedings of the Databases and Information Systems, 2018
Application of the Reference Model for Security Risk Management in the Internet of Things Systems.
Proceedings of the Databases and Information Systems X, 2018
2017
Trans. Large Scale Data Knowl. Centered Syst., 2017
Proceedings of the Software Process Improvement and Capability Determination, 2017
Proceedings of the ER Forum 2017 and the ER 2017 Demo Track co-located with the 36th International Conference on Conceptual Modelling (ER 2017), Valencia, Spain,, 2017
An Approach to Capture Role-Based Access Control Models from Spring Web Applications.
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Conference, 2017
Proceedings of the Business Process Management - 15th International Conference, 2017
2016
Inf. Syst., 2016
Selected Topics on Business Informatics Research: Editorial Introduction to Issue 6 of CSIMQ.
Complex Syst. Informatics Model. Q., 2016
Criteria and Heuristics for Business Process Model Decomposition - Review and Comparative Evaluation.
Bus. Inf. Syst. Eng., 2016
Proceedings of the Practice of Enterprise Modeling, 2016
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016
A Coarse-Grained Comparison of Modelling Languages for Business Motivation and Intentional Distribution.
Proceedings of the Perspectives in Business Informatics Research, 2016
Application of the Enterprise Model Frame for Security Requirements and Control Identification.
Proceedings of the Databases and Information Systems IX, 2016
The Enterprise Model Frame for Supporting Security Requirement Elicitation from Business Processes.
Proceedings of the Databases and Information Systems, 2016
2015
Selected Topics on Enterprise and Automated Systems: Editorial Introduction to Issue 4 of CSIMQ.
Complex Syst. Informatics Model. Q., 2015
Complex Syst. Informatics Model. Q., 2015
Proceedings of the Practice of Enterprise Modeling, 2015
An Experience Report of Improving Business Process Compliance Using Security Risk-Oriented Patterns.
Proceedings of the Practice of Enterprise Modeling, 2015
Proceedings of the Joint Proceedings of the BIR 2015 Workshops and Doctoral Consortium co-located with 14th International Conference on Perspectives in Business Informatics Research (BIR 2015), 2015
Refining Security Requirement Elicitation from Business Processes using Method Engineering.
Proceedings of the Joint Proceedings of the BIR 2015 Workshops and Doctoral Consortium co-located with 14th International Conference on Perspectives in Business Informatics Research (BIR 2015), 2015
2014
Comput. Stand. Interfaces, 2014
Proceedings of the Joint Proceedings of REFSQ-2014 Workshops, 2014
Model Comprehension and Stakeholder Appropriateness of Security Risk-Oriented Modelling Languages.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2014
Presentation and Validation of Method for Security Requirements Elicitation from Business Processes.
Proceedings of the Information Systems Engineering in Complex Environments, 2014
Proceedings of the Joint Proceedings of the CAiSE 2014 Forum and CAiSE 2014 Doctoral Consortium co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), 2014
2013
Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns.
it Inf. Technol., 2013
Int. J. Inf. Syst. Model. Des., 2013
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2013
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2013
Proceedings of the IEEE 7th International Conference on Research Challenges in Information Science, 2013
Proceedings of the Information and Software Technologies - 19th International Conference, 2013
Proceedings of the Advanced Information Systems Engineering, 2013
Proceedings of the Business Process Management Workshops, 2013
2012
Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management.
J. Univers. Comput. Sci., 2012
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks.
Int. J. Secur. Softw. Eng., 2012
Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2012
Proceedings of the Advanced Information Systems Engineering Workshops, 2012
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012
Proceedings of the Databases and Information Systems VII, 2012
2011
Comput. Sci. Inf. Syst., 2011
Towards transformation guidelines from secure tropos to misuse cases (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
2010
Visual syntax does matter: improving the cognitive effectiveness of the <i>i</i>* visual notation.
Requir. Eng., 2010
Comput. Ind., 2010
Validity of the Documentation Availability Model: Experimental Definition of Quality Interpretation.
Proceedings of the Advanced Information Systems Engineering, 22nd International Conference, 2010
Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control.
Proceedings of the Databases and Information Systems VI, 2010
Proceedings of the Local Proceedings of the Fourteenth East-European Conference on Advances in Databases and Information Systems, 2010
A Systematic Approach to Define the Domain of Information System Security Risk Management.
Proceedings of the Intentional Perspectives on Information Systems Engineering., 2010
2009
Improving the Effectiveness of Visual Representations in Requirements Engineering: An Evaluation of i* Visual Syntax.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009
2008
Défis de la sécurité de l'information. Support à la gestion des risques de sécurité par les modèles.
Ingénierie des Systèmes d Inf., 2008
Positioning Map: a Visual Technique to Improve the Layout of Diagram Contextual Information.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2008
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
Proceedings of the 3rd International i* Workshop, Recife, Brazil, February 11-12, 2008, 2008
Proceedings of the Software Architecture, Second European Conference, 2008
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development.
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Process Support for Requirements Engineering: A Requirements Engineering Tool Evaluation Approach.
PhD thesis, 2007
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2007
Design of a Modelling Language for Information System Security Risk Management.
Proceedings of the First International Conference on Research Challenges in Information Science, 2007
Proceedings of the Enterprise Interoperability II, 2007
Proceedings of the Advances in Conceptual Modeling - Foundations and Applications, 2007
2006
Proceedings of the 11th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, 2006
2005
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005
Tool Support and Specification Quality: Experimental Validation of an RE-Tool Evaluation Framework.
Proceedings of the Perspectives in Conceptual Modeling, 2005
Validating an Evaluation Framework for Requirements Engineering Tools.
Proceedings of the Information Modeling Methods and Methodologies, 2005
2004
Proceedings of the Advanced Information Systems Engineering, 16th International Conference, 2004
A Step Towards Context Insensitive Quality Control for Ontology Building Methodologies.
Proceedings of the CAiSE'04 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering, 2004
2003
Usability and Adaptability of Evaluation Framework for Requirements Engineering Tools.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003
2002
Informatica, 2002
Evaluation Framework of Requirements Engineering Tools for Verification and Validation.
Proceedings of the Advanced Conceptual Modeling Techniques, 2002