Dan Ionita

Orcid: 0000-0002-1404-3584

According to our database1, Dan Ionita authored at least 24 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Understanding Online Privacy - A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines.
ACM Comput. Surv., 2023

2021
Privacy Rating: A User-Centered Approach for Visualizing Data Handling Practices of Online Services.
IEEE Trans. Prof. Commun., 2021

2019
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach.
ACM Trans. Cyber Phys. Syst., 2019

Quantitative, Value-Driven Risk Analysis of e-Services.
J. Inf. Syst., 2019

A Business Ecosystem Architecture Modeling Framework.
Proceedings of the 21st IEEE Conference on Business Informatics, 2019

Towards Risk-Driven Security Requirements Management in Agile Software Development.
Proceedings of the Information Systems Engineering in Responsible Information Systems, 2019

2018
Tool Support for Value Modeling and Risk Analysis of e-Services.
Proceedings of the Joint Proceedings of REFSQ-2018 Workshops, 2018

2017
Outlining an 'Evaluation Continuum': Structuring Evaluation Methodologies for Infrastructure-Related Decision Making Tools.
Proceedings of the Smart Grid Inspired Future Technologies, 2017

Towards Security Requirements: Iconicity as a Feature of an Informal Modeling Language.
Proceedings of the Joint Proceedings of REFSQ-2017 Workshops, 2017

The Role of Tangibility and Iconicity in Collaborative Modelling Tasks.
Proceedings of the ER Forum 2017 and the ER 2017 Demo Track co-located with the 36th International Conference on Conceptual Modelling (ER 2017), Valencia, Spain,, 2017

Graphical Modeling of Security Arguments: Current State and Future Directions.
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017

2016
Threat Navigator: Grouping and Ranking Malicious External Threats to Current and Future Urban Smart Grids.
Proceedings of the Smart Grid Inspired Future Technologies, 2016

Web-based Collaborative Security Requirements Elicitation.
Proceedings of the Joint Proceedings of REFSQ-2016 Workshops, 2016

ArgueSecure: Out-of-the-Box Security Risk Assessment.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Value-Driven Risk Analysis of Coordination Models.
Proceedings of the Practice of Enterprise Modeling, 2016

Automated Identification and Prioritization of Business Risks in e-service Networks.
Proceedings of the Exploring Services Science - 7th International Conference, 2016

A Study on Tangible Participative Enterprise Modelling.
Proceedings of the Advances in Conceptual Modeling, 2016

2015
Using Value Models for Business Risk Analysis in e-Service Networks.
Proceedings of the Practice of Enterprise Modeling, 2015

Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group.
Proceedings of the Conceptual Modeling - 34th International Conference, 2015

2014
An information fusion approach for filtering GNSS data sets collected during construction operations.
Adv. Eng. Informatics, 2014

Argumentation-based security requirements elicitation: The next round.
Proceedings of the IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, 2014

Context-sensitive Information security Risk identification and evaluation techniques.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

2013
An API-based Search System for One Click Access to Information.
Proceedings of the 10th NTCIR Conference on Evaluation of Information Access Technologies, 2013

Risk Assessment as an Argumentation Game.
Proceedings of the Computational Logic in Multi-Agent Systems, 2013


  Loading...