Gencer Erdogan

Orcid: 0000-0001-9407-5748

According to our database1, Gencer Erdogan authored at least 28 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Systematic Review of Secure IoT Data Sharing.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Privacy-Aware IoT: State-of-the-Art and Challenges.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Cybersecurity Awareness and Capacities of SMEs.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

I Just Want to Help: SMEs Engaging with Cybersecurity Technology.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

2022
Needs and Challenges Concerning Cyber-risk Assessment in the Cyber-physical Smart Grid.
Proceedings of the 17th International Conference on Software Technologies, 2022

Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs.
Proceedings of the Software Technologies - 17th International Conference, 2022

A Need for Privacy-Assistive Technology in Notice and Consent Paradigm in IoT.
Proceedings of the Digital Sovereignty in Cyber Security: New Challenges in Future Vision, 2022

2021
Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic Approach.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

A Systematic Mapping Study on Approaches for Al-Supported Security Risk Assessment.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
An Approach to Train and Evaluate the Cybersecurity Skills of Participants in Cyber Ranges based on Cyber-Risk Models.
Proceedings of the 15th International Conference on Software Technologies, 2020

Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
The preliminary results of a mapping study of deployment and orchestration for IoT.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

A Systematic Mapping Study of Deployment and Orchestration Approaches for IoT.
Proceedings of the 4th International Conference on Internet of Things, 2019

Advances in Deployment and Orchestration Approaches for IoT - A Systematic Review.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

A Feasibility Study of a Method for Identification and Modelling of Cybersecurity Risks in the Context of Smart Power Grids.
Proceedings of the 4th International Conference on Complexity, 2019

2018
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams.
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
A Method for Developing Algorithms for Assessing Cyber-Risk Cost.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach.
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017

A Method for Developing Qualitative Security Risk Assessment Algorithms.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
Design Decisions in the Development of a Graphical Language for Risk-Driven Security Testing.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Towards Transparent Real-Time Privacy Risk Assessment of Intelligent Transport Systems.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies.
Int. J. Secur. Softw. Eng., 2015

2014
Approaches for the combined use of risk analysis and testing: a systematic literature review.
Int. J. Softw. Tools Technol. Transf., 2014

Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on UML Interactions.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

2013
A Systematic Method for Risk-Driven Test Case Design Using Annotated Sequence Diagrams.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

2010
Security Testing in Agile Web Application Development - A Case Study Using the EAST Methodology.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2010

Security Modeling and Tool Support Advantages.
Proceedings of the ARES 2010, 2010


  Loading...