Guttorm Sindre
Orcid: 0000-0001-5739-8265Affiliations:
- Norwegian University of Science and Technology, Trondheim, Norway
According to our database1,
Guttorm Sindre
authored at least 116 papers
between 1992 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on idi.ntnu.no
On csauthors.net:
Bibliography
2022
ACM Trans. Comput. Educ., 2022
Comput. Secur., 2022
Proceedings of the IEEE Frontiers in Education Conference, 2022
2021
E-exams in Norwegian higher education: Vendors and managers views on requirements in a digital ecosystem perspective.
Comput. Educ., 2021
2020
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020
Proceedings of the IEEE Frontiers in Education Conference, 2020
2019
Mitigating the Impact on Users' Privacy Caused by over Specifications in the Design of IoT Applications.
Sensors, 2019
Inf. Comput. Secur., 2019
Proceedings of the Secure IT Systems, 2019
Software Assisted Privacy Impact Assessment in Interactive Ubiquitous Computing Systems.
Proceedings of the Digital Transformation for a Sustainable Society in the 21st Century, 2019
E-Assessment in Programming Courses: Towards a Digital Ecosystem Supporting Diverse Needs?
Proceedings of the Digital Transformation for a Sustainable Society in the 21st Century, 2019
2018
J. Inf. Technol. Res., 2018
Int. J. Inf. Priv. Secur. Integr., 2018
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
Proceedings of the International Conference On Cyber Situational Awareness, 2018
2017
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017
2016
Inf. Softw. Technol., 2016
Gender Differences in Computer Science Education: Lessons Learnt from an Empirical Study at NTNU.
Proceedings of the 29th Norsk Informatikkonferanse, 2016
Activity diagrams with location context: Experimental comparison of colour and icon annotations.
Proceedings of the Information Systems Development: Complexity in Information Systems Development, 2016
Proceedings of the Advanced Information Systems Engineering Workshops, 2016
Use Case Diagrams for Mobile and Multi-channel Information Systems: Experimental Comparison of Colour and Icon Annotations.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2016
2015
IEEE Trans. Software Eng., 2015
Investigating security threats in architectural context: Experimental evaluations of misuse case maps.
J. Syst. Softw., 2015
Proceedings of the 28th Norsk Informatikkonferanse, 2015
2014
Inf. Softw. Technol., 2014
An Experimental Comparison of System Diagrams and Textual Use Cases for the Identification of Safety Hazards.
Int. J. Inf. Syst. Model. Des., 2014
Proceedings of the 27th Norsk Informatikkonferanse, 2014
2013
J. Univers. Comput. Sci., 2013
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2013
Proceedings of the Managing Requirements Knowledge., 2013
Proceedings of the Seminal Contributions to Information Systems Engineering, 2013
Proceedings of the Seminal Contributions to Information Systems Engineering, 2013
2012
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks.
Int. J. Secur. Softw. Eng., 2012
Capturing Location in Process Models: Comparing Small Adaptations of Mainstream Notation.
Int. J. Inf. Syst. Model. Des., 2012
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012
Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012
Proceedings of the Second IEEE International Workshop on Requirements Patterns, 2012
A comparative review of i<sup>∗</sup>-based and use case-based security modelling initiatives.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012 Workshops, 2012
Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2012
2011
Inf. Softw. Technol., 2011
Proceedings of the 4th International Workshop on Managing Requirements Knowledge, 2011
Using a multi-criteria decision making approach to evaluate format migration solutions.
Proceedings of the MEDES '11: International ACM Conference on Management of Emergent Digital EcoSystems, 2011
Proceedings of the Practice of Enterprise Modeling - 4th IFIP WG 8.1 Working Conference, 2011
Adapted UML Activity Diagrams for Mobile Work Processes: Experimental Comparison of Colour and Pattern Fills.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2011
Proceedings of the Sixth International Conference on Availability, 2011
Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations.
Proceedings of the Sixth International Conference on Availability, 2011
Proceedings of the Relating Software Requirements and Architectures., 2011
2010
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010
Proceedings of the Practice of Enterprise Modeling - Third IFIP WG 8.1 Working Conference, 2010
Adapting UML Activity Diagrams for Mobile Work Process Modelling: Experimental Comparison of Two Notation Alternatives.
Proceedings of the Practice of Enterprise Modeling - Third IFIP WG 8.1 Working Conference, 2010
Proceedings of the Enterprise Interoperability IV, 2010
Towards a Hacker Attack Representation Method.
Proceedings of the ICSOFT 2010, 2010
Proceedings of the Software and Data Technologies - 5th International Conference, 2010
Proceedings of the Advanced Information Systems Engineering, 22nd International Conference, 2010
2009
Experimental Validation of the Learning Effect for a Pedagogical Game on Computer Fundamentals.
IEEE Trans. Educ., 2009
Report on the working conference on requirements engineering: foundation for software quality (REFSQ'09).
ACM SIGSOFT Softw. Eng. Notes, 2009
Experimental comparison of attack trees and misuse cases for security threat identification.
Inf. Softw. Technol., 2009
Int. J. Inf. Syst. Serv. Sect., 2009
Comput. Appl. Eng. Educ., 2009
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009
Proceedings of the MEDES '09: International ACM Conference on Management of Emergent Digital EcoSystems, 2009
CoP4V : Context-Based Protocol for Vehicle's Safety in Highways Using Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the International Conference on Interoperability for Enterprise Software and Applications China, 2009
Proceedings of the Web Engineering, 9th International Conference, 2009
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009
2008
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams.
Proceedings of the Model Driven Engineering Languages and Systems, 2008
2007
Integrating Semantic Web Technology, Web Services, and Workflow Modeling: Achieving System and Business Interoperability.
Int. J. Enterp. Inf. Syst., 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2007
Proceedings of the 11th International Conference on Information Visualisation, 2007
Proceedings of the Situational Method Engineering: Fundamentals and Experiences, 2007
Proceedings of the Conceptual Modeling, 2007
2006
Eur. J. Inf. Syst., 2006
2005
Tool Support and Specification Quality: Experimental Validation of an RE-Tool Evaluation Framework.
Proceedings of the Perspectives in Conceptual Modeling, 2005
Proceedings of the 10th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, 2005
Teaching Oral Communication Techniques in RE by Student-Student Role Play: Initial Experiences.
Proceedings of the 18th Conference on Software Engineering Education and Training (CSEE&T 2005), 2005
2004
COEUR-SW: Concepts On Enriching, Understanding and Retrieving the Semantics on the web.
Proceedings of the CAiSE'04 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering, 2004
A Step Towards Context Insensitive Quality Control for Ontology Building Methodologies.
Proceedings of the CAiSE'04 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering, 2004
2003
Proceedings of the 8th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2003
Positive Experiences with an Open Project Assignment in an Introductory Programming Course.
Proceedings of the 25th International Conference on Software Engineering, 2003
Evaluating the Quality of Information Models: Empirical Testing of a Conceptual Model Quality Framework.
Proceedings of the 25th International Conference on Software Engineering, 2003
Evaluating the effectiveness of learning interventions: an information systems case study.
Proceedings of the 11th European Conference on Information Systems, 2003
Proceedings of the 16th Conference on Software Engineering Education and Training (CSEE&T 2003), 2003
2002
Proceedings of the Conceptual Modeling, 2002
2000
Proceedings of the TOOLS Pacific 2000: 37th International Conference on Technology of Object-Oriented Languages and Systems, 2000
1997
Inf. Syst., 1997
1996
Requir. Eng., 1996
Proceedings of the 29th Annual Hawaii International Conference on System Sciences (HICSS-29), 1996
1995
Defining quality aspects for conceptual models.
Proceedings of the Information System Concepts: Towards a Consolidation of Views, 1995
Proceedings of the 28th Annual Hawaii International Conference on System Sciences (HICSS-28), 1995
Proceedings of the Advanced Information Systems Engineering, 7th International Conference, 1995
Proceedings of the Advanced Information Systems Engineering, 7th International Conference, 1995
1994
Extending a temporal rule language with deontic operators.
Proceedings of the SEKE'94, 1994
Proceedings of the Software Process Technology, Third European Workshop, 1994
Proceedings of the Software Engineering Education, 1994
1993
Proceedings of the 1993 IEEE Workshop on Visual Languages, 1993
Terminology Evolution in Component Libraries.
Proceedings of the Terminology and Knowledge Engineering, 1993
Proceedings of the Eighth Annual Conference on Object-Oriented Programming Systems, 1993
Privacy and Computing: a Cultural Perspective.
Proceedings of the Security and Control of Information Technology in Society, 1993
Proceedings of the Proceedings Advances in Software Reuse, 1993
Proceedings of the Proceedings Advances in Software Reuse, 1993
A Method for Software Reuse Through Large Component Libraries.
Proceedings of the Computing and Information, 1993
Proceedings of the Advanced Information Systems Engineering, 1993
1992
Heuristics for Maintaining Term Structures for Relaxes Search.
Proceedings of the International Conference on Database and Expert Systems Applications, 1992
Proceedings of the Software Engineering Education, SEI Conference, 1992, Proceedings, 1992