Jörn Eichler

Orcid: 0000-0002-0822-2981

According to our database1, Jörn Eichler authored at least 13 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Security Risk Assessments: Modeling and Risk Level Propagation.
ACM Trans. Cyber Phys. Syst., January, 2023

2016
Systematic Identification of Security Goals and Threats in Risk Assessment.
Softwaretechnik-Trends, 2016

Agile Threat Assessment and Mitigation: An Approach for Method Selection and Tailoring.
Int. J. Secur. Softw. Eng., 2016

Supporting Risk Assessment with the Systematic Identification, Merging, and Validation of Security Goals.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

2015
Model-based Security Engineering of Electronic Business Processes (Modell-basiertes Security Engineering elektronischer Geschäftsprozesse)
PhD thesis, 2015

Improving prioritization of software weaknesses using security models with AVUS.
Proceedings of the 15th IEEE International Working Conference on Source Code Analysis and Manipulation, 2015

Method Selection and Tailoring for Agile Threat Assessment and Mitigation.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Monitoring Security Compliance of Critical Processes.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

2012
Towards a Security Engineering Process Model for Electronic Business Processes
CoRR, 2012

SecEPM: A Security Engineering Process Model for Electronic Business Processes.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

Supporting Security Engineering at Design Time with Adequate Tooling.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

2011
The ADiWa Project - On the Way to Just-in-time Process Dynamics based on Events from the Internet of Things.
Proceedings of the ICEIS 2011, 2011

Lightweight Modeling and Analysis of Security Concepts.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011


  Loading...