Guttorm Sindre

Orcid: 0000-0001-5739-8265

Affiliations:
  • Norwegian University of Science and Technology, Trondheim, Norway


According to our database1, Guttorm Sindre authored at least 116 papers between 1992 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Study Behavior in Computing Education - A Systematic Literature Review.
ACM Trans. Comput. Educ., 2022

Assessing cyber threats for storyless systems.
J. Inf. Secur. Appl., 2022

Influencing the security prioritisation of an agile software development project.
Comput. Secur., 2022

Techniques for detecting and deterring cheating in home exams in programming.
Proceedings of the IEEE Frontiers in Education Conference, 2022

2021
E-exams in Norwegian higher education: Vendors and managers views on requirements in a digital ecosystem perspective.
Comput. Educ., 2021

2020
The Ransomware-as-a-Service economy within the darknet.
Comput. Secur., 2020

Breaking the Cyber Kill Chain by Modelling Resource Costs.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

Code Writing vs Code Completion Puzzles: Analyzing Questions in an E-exam.
Proceedings of the IEEE Frontiers in Education Conference, 2020

2019
Mitigating the Impact on Users' Privacy Caused by over Specifications in the Design of IoT Applications.
Sensors, 2019

An experimental evaluation of bow-tie analysis for security.
Inf. Comput. Secur., 2019

An Experimental Analysis of Cryptojacking Attacks.
Proceedings of the Secure IT Systems, 2019

Software Assisted Privacy Impact Assessment in Interactive Ubiquitous Computing Systems.
Proceedings of the Digital Transformation for a Sustainable Society in the 21st Century, 2019

E-Assessment in Programming Courses: Towards a Digital Ecosystem Supporting Diverse Needs?
Proceedings of the Digital Transformation for a Sustainable Society in the 21st Century, 2019

2018
A Systematic Mapping Study on Requirements Engineering in Software Ecosystems.
J. Inf. Technol. Res., 2018

The privacy aware transmission highway framework.
Int. J. Inf. Priv. Secur. Integr., 2018

An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

A Netnographic Study on the Dark Net Ecosystem for Ransomware.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2017
Identifying dropout factors in information technology education: A case study.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

2016
Challenges and strategies for motivating software testing personnel.
Inf. Softw. Technol., 2016

Gender Differences in Computer Science Education: Lessons Learnt from an Empirical Study at NTNU.
Proceedings of the 29th Norsk Informatikkonferanse, 2016

Activity diagrams with location context: Experimental comparison of colour and icon annotations.
Proceedings of the Information Systems Development: Complexity in Information Systems Development, 2016

Extending HARM to make Test Cases for Penetration Testing.
Proceedings of the Advanced Information Systems Engineering Workshops, 2016

Use Case Diagrams for Mobile and Multi-channel Information Systems: Experimental Comparison of Colour and Icon Annotations.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2016

2015
Extending the UML Statecharts Notation to Model Security Aspects.
IEEE Trans. Software Eng., 2015

Investigating security threats in architectural context: Experimental evaluations of misuse case maps.
J. Syst. Softw., 2015

E-exams and exam process improvement.
Proceedings of the 28th Norsk Informatikkonferanse, 2015

2014
Comparing attack trees and misuse cases in an industrial setting.
Inf. Softw. Technol., 2014

An Experimental Comparison of System Diagrams and Textual Use Cases for the Identification of Safety Hazards.
Int. J. Inf. Syst. Model. Des., 2014

Et informatikkperspektiv på norsk lovgivning om karakterklager i høyere utdanning.
Proceedings of the 27th Norsk Informatikkonferanse, 2014

2013
A Tool-based Semantic Framework for Security Requirements Specification.
J. Univers. Comput. Sci., 2013

Visually Capturing Usage Context in BPMN by Small Adaptations of Diagram Notation.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2013

Using Ontologies and Machine Learning for Hazard Identification and Safety Analysis.
Proceedings of the Managing Requirements Knowledge., 2013

20 Years of Quality of Models.
Proceedings of the Seminal Contributions to Information Systems Engineering, 2013

Towards a Deeper Understanding of Quality in Requirements Engineering.
Proceedings of the Seminal Contributions to Information Systems Engineering, 2013

2012
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks.
Int. J. Secur. Softw. Eng., 2012

Capturing Location in Process Models: Comparing Small Adaptations of Mainstream Notation.
Int. J. Inf. Syst. Model. Des., 2012

Managing Implicit Requirements Using Semantic Case-Based Reasoning Research Preview.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012

Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012

Pattern-based security requirements specification using ontologies and boilerplates.
Proceedings of the Second IEEE International Workshop on Requirements Patterns, 2012

A comparative review of i<sup>∗</sup>-based and use case-based security modelling initiatives.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012

Ontology-Based Support for Security Requirements Specification Process.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012 Workshops, 2012

Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2012

2011
Exploring a Bayesian and linear approach to requirements traceability.
Inf. Softw. Technol., 2011

Enabling hazard identification from requirements and reuse-oriented HAZOP analysis.
Proceedings of the 4th International Workshop on Managing Requirements Knowledge, 2011

Using a multi-criteria decision making approach to evaluate format migration solutions.
Proceedings of the MEDES '11: International ACM Conference on Management of Emergent Digital EcoSystems, 2011

Diagram Notations for Mobile Work Processes.
Proceedings of the Practice of Enterprise Modeling - 4th IFIP WG 8.1 Working Conference, 2011

Adapted UML Activity Diagrams for Mobile Work Processes: Experimental Comparison of Colour and Pattern Fills.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2011

Characterising and Analysing Security Requirements Modelling Initiatives.
Proceedings of the Sixth International Conference on Availability, 2011

Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations.
Proceedings of the Sixth International Conference on Availability, 2011

Understanding Architectural Elements from Requirements Traceability Networks.
Proceedings of the Relating Software Requirements and Architectures., 2011

2010
A Domain Ontology Building Process for Guiding Requirements Elicitation.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010

Visualizing Cyber Attacks with Misuse Case Maps.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010

Comparing Two Techniques for Intrusion Visualization.
Proceedings of the Practice of Enterprise Modeling - Third IFIP WG 8.1 Working Conference, 2010

Adapting UML Activity Diagrams for Mobile Work Process Modelling: Experimental Comparison of Two Notation Alternatives.
Proceedings of the Practice of Enterprise Modeling - Third IFIP WG 8.1 Working Conference, 2010

Alternative Process Notations for Mobile Information Systems.
Proceedings of the Enterprise Interoperability IV, 2010

Towards a Hacker Attack Representation Method.
Proceedings of the ICSOFT 2010, 2010

HARM: Hacker Attack Representation Method.
Proceedings of the Software and Data Technologies - 5th International Conference, 2010

Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases.
Proceedings of the Advanced Information Systems Engineering, 22nd International Conference, 2010

2009
Experimental Validation of the Learning Effect for a Pedagogical Game on Computer Fundamentals.
IEEE Trans. Educ., 2009

Report on the working conference on requirements engineering: foundation for software quality (REFSQ'09).
ACM SIGSOFT Softw. Eng. Notes, 2009

Experimental comparison of attack trees and misuse cases for security threat identification.
Inf. Softw. Technol., 2009

A Survey of Development Methods for Semantic Web Service Systems.
Int. J. Inf. Syst. Serv. Sect., 2009

A compulsory yet motivating question/answer game to teach computer fundamentals.
Comput. Appl. Eng. Educ., 2009

Use Case to Source Code Traceability: The Developer Navigation View Point.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

Argumentative agents to handle the conflicts between web services: a prototype.
Proceedings of the MEDES '09: International ACM Conference on Management of Emergent Digital EcoSystems, 2009

CoP4V : Context-Based Protocol for Vehicle's Safety in Highways Using Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Taxonomy of Mobility-Related Requirements.
Proceedings of the International Conference on Interoperability for Enterprise Software and Applications China, 2009

An Optimization Rule for ActiveXML Workflows.
Proceedings of the Web Engineering, 9th International Conference, 2009

A revised taxonomy of mobility-related requirements.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Improving the Performance of ActiveXML Workflows: The Formal Descriptions.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

2008
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams.
Proceedings of the Model Driven Engineering Languages and Systems, 2008

2007
Integrating Semantic Web Technology, Web Services, and Workflow Modeling: Achieving System and Business Interoperability.
Int. J. Enterp. Inf. Syst., 2007

Improving the Information Security Model by using TFI.
Proceedings of the New Approaches for Security, 2007

Mal-Activity Diagrams for Capturing Attacks on Business Processes.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2007

Software Engineering Students meet Interdisciplinary Project work and Art.
Proceedings of the 11th International Conference on Information Visualisation, 2007

A Look at Misuse Cases for Safety Concerns.
Proceedings of the Situational Method Engineering: Fundamentals and Experiences, 2007

A Comparison of Two Approaches to Safety Analysis Based on Use Cases.
Proceedings of the Conceptual Modeling, 2007

Preface.
Proceedings of the CAiSE'07 Forum, 2007

2006
Process models representing knowledge for action: a revised quality framework.
Eur. J. Inf. Syst., 2006

2005
Eliciting security requirements with misuse cases.
Requir. Eng., 2005

Tool Support and Specification Quality: Experimental Validation of an RE-Tool Evaluation Framework.
Proceedings of the Perspectives in Conceptual Modeling, 2005

An Analytical Evaluation of BPMN Using a Semiotic Quality Framework.
Proceedings of the 10th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, 2005

Teaching Oral Communication Techniques in RE by Student-Student Role Play: Initial Experiences.
Proceedings of the 18th Conference on Software Engineering Education and Training (CSEE&T 2005), 2005

2004
COEUR-SW: Concepts On Enriching, Understanding and Retrieving the Semantics on the web.
Proceedings of the CAiSE'04 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering, 2004

A Step Towards Context Insensitive Quality Control for Ontology Building Methodologies.
Proceedings of the CAiSE'04 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering, 2004

2003
Introducing Peer Review in an IS Analysis Course.
J. Inf. Syst. Educ., 2003

Incorporating quality assurance processes into requirements analysis education.
Proceedings of the 8th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2003

Positive Experiences with an Open Project Assignment in an Introductory Programming Course.
Proceedings of the 25th International Conference on Software Engineering, 2003

Evaluating the Quality of Information Models: Empirical Testing of a Conceptual Model Quality Framework.
Proceedings of the 25th International Conference on Software Engineering, 2003

Evaluating the effectiveness of learning interventions: an information systems case study.
Proceedings of the 11th European Conference on Information Systems, 2003

The Cross-Course Software Engineering Project at the NTNU: Four Years of Experience.
Proceedings of the 16th Conference on Software Engineering Education and Training (CSEE&T 2003), 2003

2002
Evaluating the Quality of Process Models: Empirical Testing of a Quality Framework.
Proceedings of the Conceptual Modeling, 2002

2000
Eliciting Security Requirements by Misuse Cases.
Proceedings of the TOOLS Pacific 2000: 37th International Conference on Technology of Object-Oriented Languages and Systems, 2000

1997
Facet Modelling: An Approach to Flexible and Integrated Conceptual Modelling.
Inf. Syst., 1997

1996
Utilizing Deonetic Operators in Information Systems Specification.
Requir. Eng., 1996

Towards an Integrated, Simulative Framework for Real-World Modelling.
Proceedings of the 29th Annual Hawaii International Conference on System Sciences (HICSS-29), 1996

1995
The REBOOT approach to software reuse.
J. Syst. Softw., 1995

Defining quality aspects for conceptual models.
Proceedings of the Information System Concepts: Towards a Consolidation of Views, 1995

Representing real-world processes.
Proceedings of the 28th Annual Hawaii International Conference on System Sciences (HICSS-28), 1995

Facet Models for Problem Analysis
Proceedings of the Advanced Information Systems Engineering, 7th International Conference, 1995

Towards a Deeper Understanding of Quality in Requirements Engineering
Proceedings of the Advanced Information Systems Engineering, 7th International Conference, 1995

1994
Understanding Quality in Conceptual Modeling.
IEEE Softw., 1994

A Taxonomy for Real-World Modelling Concepts.
Inf. Syst., 1994

Extending a temporal rule language with deontic operators.
Proceedings of the SEKE'94, 1994

A Comparison of Modelling Frameworks for Software Processes and Information Systems.
Proceedings of the Software Process Technology, Third European Workshop, 1994

Project Courses at the NTH: 20 Years of Experience.
Proceedings of the Software Engineering Education, 1994

1993
Onion graphs: aesthetics and layout.
Proceedings of the 1993 IEEE Workshop on Visual Languages, 1993

Terminology Evolution in Component Libraries.
Proceedings of the Terminology and Knowledge Engineering, 1993

On the Purpose of Object-Oriented Analysis.
Proceedings of the Eighth Annual Conference on Object-Oriented Programming Systems, 1993

Privacy and Computing: a Cultural Perspective.
Proceedings of the Security and Control of Information Technology in Society, 1993

Experiences from application of a faceted classification scheme.
Proceedings of the Proceedings Advances in Software Reuse, 1993

Performance considerations in object-oriented reuse.
Proceedings of the Proceedings Advances in Software Reuse, 1993

A Method for Software Reuse Through Large Component Libraries.
Proceedings of the Computing and Information, 1993

Concepts for Real-World Modelling
Proceedings of the Advanced Information Systems Engineering, 1993

1992
Heuristics for Maintaining Term Structures for Relaxes Search.
Proceedings of the International Conference on Database and Expert Systems Applications, 1992

Software Reuse in an Educational Perspective.
Proceedings of the Software Engineering Education, SEI Conference, 1992, Proceedings, 1992


  Loading...