Johannes Viehmann

According to our database1, Johannes Viehmann authored at least 12 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A Taxonomy to Assess and Tailor Risk-Based Testing in Recent Testing Standards.
IEEE Softw., 2020

2019
Das S-Netzwerk und seine potenzielle wirtschaftliche Bedeutung.
PhD thesis, 2019

2016
Business Driven ICT Risk Management in the Banking Domain with RACOMAT.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

2015
Risk Assessment and Security Testing of Large Scale Networked Systems with RACOMAT.
Proceedings of the Risk Assessment and Risk-Driven Testing - Third International Workshop, 2015

2014
Risikoanalyse mit automatischen Sicherheitstests.
Softwaretechnik-Trends, 2014

Risk Management for Outsourcing to the Cloud: Security Risks and Safeguards as Selection Criteria for Extern Cloud Services.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Combining Risk Analysis and Security Testing.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 2014

2013
Towards Integration of Compositional Risk Analysis Using Monte Carlo Simulation and Security Testing.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

A Trace Management Platform for Risk-Based Security Testing.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

2012
Reusing Risk Analysis Results - An Extension for the CORAS Risk Analysis Method.
Proceedings of the 2012 International Conference on Privacy, 2012

The theory of creating trust with a set of mistrust-parties.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

2011
Secure communication with secret sharing in static computer networks with partition in mistrust parties.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011


  Loading...