Katsiaryna Labunets

Orcid: 0000-0003-0884-2440

According to our database1, Katsiaryna Labunets authored at least 22 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Security Risk Assessment Method for Distributed Ledger Technology (DLT) based Applications: Three Industry Case Studies.
CoRR, 2024

2023
A new, evidence-based, theory for knowledge reuse in security risk analysis.
Empir. Softw. Eng., 2023

An Evaluation of the Product Security Maturity Model Through Case Studies at 15 Software Producing Organizations.
Proceedings of the Software Business - 14th International Conference, 2023

Poster: The Unknown Unknown: Cybersecurity Threats of Shadow IT in Higher Education.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

How Different Elements of Audio Affect the Word Error Rate of Transcripts in Automated Medical Reporting.
Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies, 2023

2022
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
Proceedings of the 31st USENIX Security Symposium, 2022

2019
An Adversarial Risk Analysis Framework for Cybersecurity.
CoRR, 2019

Assessing the effect of learning styles on risk model comprehensibility: A controlled experiment (short paper).
Proceedings of the Joint Proceedings of REFSQ-2019 Workshops, 2019

2018
No search allowed: what risk modeling notation to choose?
Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2018

2017
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations.
Empir. Softw. Eng., 2017

On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2017

Teaching predictive modeling to junior software engineers - seminar format and its evaluation: poster.
Proceedings of the 39th International Conference on Software Engineering, 2017

Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment.
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017

Graphical vs. Tabular Notations for Risk Models: On the Role of Textual Labels and Complexity.
Proceedings of the 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2017

2016
Security Risk Assessment Methods: An Evaluation Framework and Theoretical Model of the Criteria Behind Methods Success.
PhD thesis, 2016

Modeling Structured and Unstructured Processes: An Empirical Evaluation.
Proceedings of the Conceptual Modeling - 35th International Conference, 2016

Towards Empirical Evaluation of Automated Risk Assessment Methods.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2015

Which security catalogue is better for novices?
Proceedings of the 2015 IEEE Fifth International Workshop on Empirical Requirements Engineering, 2015

2014
Empirical Assessment of Security Requirements and Architecture: Lessons Learned.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

An experiment on comparing textual vs. visual industrial methods for security risk assessment.
Proceedings of the 4th IEEE International Workshop on Empirical Requirements Engineering, 2014

2013
An Experimental Comparison of Two Risk-Based Security Methods.
Proceedings of the 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2013


  Loading...