Basel Katt

Orcid: 0000-0002-0177-9496

According to our database1, Basel Katt authored at least 69 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A quantitative framework for security assurance evaluation and selection of cloud services: a case study.
Int. J. Inf. Sec., December, 2023

A quantitative security evaluation and analysis model for web applications based on OWASP application security verification standard.
Comput. Secur., December, 2023

Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code.
Comput. Secur., May, 2023

Hybrid IoT Cyber Range.
Sensors, March, 2023

Automatic Verification and Execution of Cyber Attack on IoT Devices.
Sensors, January, 2023

Intelligent Contextualized Network Traffic Generator in a Cyber Range.
Proceedings of the 17th International Conference on Signal-Image Technology & Internet-Based Systems, 2023

A Metamodel for Web Application Security Evaluation.
Proceedings of the 34th Conference of Open Innovations Association, 2023

Automatic and Realistic Traffic Generation In A Cyber Range.
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023

Data Driven Skill Assessment for Cybersecurity Exercises.
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023

Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Developing Security Assurance Metrics to Support Quantitative Security Assurance Evaluation.
J. Cybersecur. Priv., August, 2022

System security assurance: A systematic literature review.
Comput. Sci. Rev., 2022

Use of cyber attack and defense agents in cyber ranges: A case study.
Comput. Secur., 2022

Modeling and executing cyber security exercise scenarios in cyber ranges.
Comput. Secur., 2022

Systematic Generation of XSS and SQLi Vulnerabilities in PHP as Test Cases for Static Code Analysis.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study.
Proceedings of the Augmented Cognition, 2022

SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
Weaponized AI for cyber attacks.
J. Inf. Secur. Appl., 2021

Serious games as a tool to model attack and defense scenarios for cyber-security exercises.
Comput. Secur., 2021

Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study.
Proceedings of the Augmented Cognition, 2021

Ontology-Based Scenario Modeling for Cyber Security Exercise.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

2020
UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices.
Sensors, 2020

Cyber ranges and security testbeds: Scenarios, functions, tools and architecture.
Comput. Secur., 2020

Towards a Maturity Improvement Process - Systemically Closing the Socio-Technical Gap.
Proceedings of the 6th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2020), 2020

Maturity Modelling to Prepare for Cyber Crisis Escalation and Management.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Managing Software Security Knowledge in Context: An Ontology Based Approach.
Inf., 2019

Cyber Weapons Storage Mechanisms.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Cyber Crisis Management Roles - A Municipality Responsibility Case Study.
Proceedings of the Information Technology in Disaster Risk Reduction, 2019

Change Point Problem in Security Vulnerability Discovery Model.
Proceedings of the International Conference on Software Security and Assurance, 2019

Mobile device management (MDM) technologies, issues and challenges.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

Difficult XSS Code Patterns for Static Code Analysis Tools.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

A Socio-Technical Framework to Improve Cyber Security Training: A Work in Progress.
Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2019) co-located with 27th European Conference on Information Systems (ECIS 2019), 2019

Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security.
Proceedings of the Evaluation and Assessment on Software Engineering, 2019

A Survey of Automated Information Exchange Mechanisms Among CERTs.
Proceedings of the 5th Collaborative European Research Conference (CERC 2019), 2019

Cyber Security Skill Set Analysis for Common Curricula Development.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Learning Software Security in Context: An Evaluation in Open Source Software Development Environment.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox.
Proceedings of the Sicherheit 2018, 2018

Detecting Malicious Windows Commands Using Natural Language Processing Techniques.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Security Knowledge Management in Open Source Software Communities.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain.
Proceedings of the EXplainable AI in Law Workshop co-located with the 31st International Conference on Legal Knowledge and Information Systems, 2018

A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

An Ontology-Based Context Model for Managing Security Knowledge in Software Development.
Proceedings of the 23rd Conference of Open Innovations Association, 2018

Quantitative security assurance metrics: REST API case studies.
Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, 2018

Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper.
Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and Trends in Cybersecurity (ALEC 2018) co-located with the Association for the Advancement of Artificial Intelligence 2018 Fall Symposium Series (AAAI-FSS 2018), 2018

2017
Source Code Patterns of SQL Injection Vulnerabilities.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2015
A process for mastering security evolution in the development lifecycle.
Int. J. Softw. Tools Technol. Transf., 2015

2014
Evolution of Security Engineering Artifacts: A State of the Art Survey.
Int. J. Secur. Softw. Eng., 2014

Security Test Generation by Answer Set Programming.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

A Comprehensive Overview of Security Monitoring Solutions for E-Health Systems.
Proceedings of the 2014 IEEE International Conference on Healthcare Informatics, 2014

Factors of Access Control Management in Electronic Healthcare: The Patients' Perspective.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2012
Managing Privacy and Effectiveness of Patient-Administered Authorization Policies.
Int. J. Comput. Model. Algorithms Medicine, 2012

Considering privacy and effectiveness of authorization policies for shared electronic health records.
Proceedings of the ACM International Health Informatics Symposium, 2012

Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning.
Proceedings of the Trustworthy Eternal Systems via Evolving Software, Data and Knowledge, 2012

2011
Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing.
Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation, 2011

Enhancing Model Driven Security through Pattern Refinement Techniques.
Proceedings of the Formal Methods for Components and Objects, 10th International Symposium, 2011

Towards a Model- and Learning-Based Framework for Security Anomaly Detection.
Proceedings of the Formal Methods for Components and Objects, 10th International Symposium, 2011

The Process of Policy Authoring of Patient-Controlled Privacy Preferences.
Proceedings of the Electronic Healthcare - 4th International Conference, 2011

2010
Meeting EHR Security Requirements: Authentication as a Security Service.
Proceedings of the perspeGKtive 2010, 2010

Supporting Role Based Provisioning with Rules Using OWL and F-Logic.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

Implementation of a Secure and Interoperable Generic e-Health Infrastructure for Shared Electronic Health Records based on IHE Integration Profiles.
Proceedings of the MEDINFO 2010, 2010

An Authoring Framework for Security Policies: A Use-Case within the Healthcare Domain.
Proceedings of the Electronic Healthcare - Third International Conference, 2010

Meeting EHR Security Requirements: SeAAS Approach.
Proceedings of the Seamless Care - Safe Care - The Challenges of Interoperability and Patient Safety in Health Care, 2010

2009
Towards a Usage Control Policy Specification with Petri Nets.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

A usage control policy specification with Petri nets.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Building a stateful reference monitor with coloured petri nets.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
A general obligation model and continuity: enhanced policy enforcement engine for usage control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Workflow Testing.
Proceedings of the Leveraging Applications of Formal Methods, 2008

Privacy and Access Control for IHE-Based Systems.
Proceedings of the Electronic Healthcare, First International Conference, 2008


  Loading...