Gencer Erdogan

According to our database1, Gencer Erdogan authored at least 21 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

A Systematic Mapping Study on Approaches for Al-Supported Security Risk Assessment.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
An Approach to Train and Evaluate the Cybersecurity Skills of Participants in Cyber Ranges based on Cyber-Risk Models.
Proceedings of the 15th International Conference on Software Technologies, 2020

Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
The preliminary results of a mapping study of deployment and orchestration for IoT.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

A Systematic Mapping Study of Deployment and Orchestration Approaches for IoT.
Proceedings of the 4th International Conference on Internet of Things, 2019

Advances in Deployment and Orchestration Approaches for IoT - A Systematic Review.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

A Feasibility Study of a Method for Identification and Modelling of Cybersecurity Risks in the Context of Smart Power Grids.
Proceedings of the 4th International Conference on Complexity, 2019

2018
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams.
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
A Method for Developing Algorithms for Assessing Cyber-Risk Cost.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach.
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017

A Method for Developing Qualitative Security Risk Assessment Algorithms.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
Design Decisions in the Development of a Graphical Language for Risk-Driven Security Testing.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Towards Transparent Real-Time Privacy Risk Assessment of Intelligent Transport Systems.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies.
Int. J. Secur. Softw. Eng., 2015

2014
Approaches for the combined use of risk analysis and testing: a systematic literature review.
Int. J. Softw. Tools Technol. Transf., 2014

Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on UML Interactions.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

2013
A Systematic Method for Risk-Driven Test Case Design Using Annotated Sequence Diagrams.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

2010
Security Testing in Agile Web Application Development - A Case Study Using the EAST Methodology.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2010

Security Modeling and Tool Support Advantages.
Proceedings of the ARES 2010, 2010


  Loading...