Kristian Beckers

According to our database1, Kristian Beckers authored at least 87 papers between 2009 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Using Process Models to Understand Security Standards.
Proceedings of the SOFSEM 2021: Theory and Practice of Computer Science, 2021

2020
A Light-Weight Tool for the Self-assessment of Security Compliance in Software Development - An Industry Case.
Proceedings of the SOFSEM 2020: Theory and Practice of Computer Science, 2020

Integration of Security Standards in DevOps Pipelines: An Industry Case Study.
Proceedings of the Product-Focused Software Process Improvement, 2020

How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale?
Proceedings of the Product-Focused Software Process Improvement, 2020

Conceptualization of a CyberSecurity Awareness Quiz.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

Welcome from the ESPRE 2020 Organisers.
Proceedings of the 7th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2020

2019
On the Requirements for Serious Games Geared Towards Software Developers in the Industry.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

Preface Sixth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'19).
Proceedings of the 27th IEEE International Requirements Engineering Conference Workshops, 2019

When Interactive Graphic Storytelling Fails.
Proceedings of the 27th IEEE International Requirements Engineering Conference Workshops, 2019

The THREAT-ARREST Cyber-Security Training Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

An Assessment Model for Continuous Security Compliance in Large Scale Agile Environments - Exploratory Paper.
Proceedings of the Advanced Information Systems Engineering, 2019

2018
PERSUADED: Fighting Social Engineering Attacks with a Serious Game.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

A Comprehensive Framework for Security in Engineering Projects - Based on IEC 62443.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018

Towards continuous security compliance in agile software development at scale.
Proceedings of the 4th International Workshop on Rapid Continuous Software Engineering, 2018

Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
A structured hazard analysis and risk assessment method for automotive systems - A descriptive study.
Reliab. Eng. Syst. Saf., 2017

A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interface.
Reliab. Eng. Syst. Saf., 2017

Informatikforschung für digitale Mobilitätsplattformen - Am Beispiel des TUM Living Lab Connected Mobility.
Inform. Spektrum, 2017

Social engineering defence mechanisms and counteracting training strategies.
Inf. Comput. Secur., 2017

An Exploratory Survey of Hybrid Testing Techniques Involving Symbolic Execution and Fuzzing.
CoRR, 2017

ACCBench: A Framework for Comparing Causality Algorithms.
Proceedings of the Proceedings 2nd International Workshop on Causal Reasoning for Embedded and safety-critical Systems Technologies, 2017

A Structured Comparison of Social Engineering Intelligence Gathering Tools.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

A Lightweight Threat Analysis Approach Intertwining Safety and Security for the Automotive Domain.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment.
Proceedings of the Joint Proceedings of REFSQ-2017 Workshops, 2017

Erratum to: How Accountability is Implemented and Understood in Research Tools - A Systematic Mapping Study.
Proceedings of the Product-Focused Software Process Improvement, 2017

How Accountability is Implemented and Understood in Research Tools - A Systematic Mapping Study.
Proceedings of the Product-Focused Software Process Improvement, 2017


2016
Standard Compliant Hazard and Threat Analysis for the Automotive Domain.
Inf., 2016

Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

A Serious Game for Eliciting Social Engineering Security Requirements.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Security attack analysis using attack patterns.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

Failure Models for Testing Continuous Controllers.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Data Accountability in Socio-Technical Systems.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2016

Persona-Driven Information Security Awareness.
Proceedings of the HCI 2016, 2016

HATCH: Hack And Trick Capricious Humans - A Serious Game on Social Engineering.
Proceedings of the HCI 2016, 2016

2015
Using Attack Graphs to Analyze Social Engineering Threats.
Int. J. Secur. Softw. Eng., 2015

A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Engineering trust- and reputation-based security controls for future internet systems.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Holistic security requirements analysis: An attacker's perspective.
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015

A Holistic Approach to Attack Modeling and Analysis.
Proceedings of the Eighth International i*Workshop, 2015

Analyzing Attack Strategies Through Anti-goal Refinement.
Proceedings of the Practice of Enterprise Modeling, 2015

Pattern and Security Requirements - Engineering-Based Establishment of Security Standards
Springer, ISBN: 978-3-319-16664-3, 2015

2014
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

A Structured Comparison of Security Standards.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Supporting Common Criteria Security Analysis with Problem Frames.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain.
Int. J. Secur. Softw. Eng., 2014

Privacy-Aware Cloud Deployment Scenario Selection.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Goal-Based Establishment of an Information Security Management System Compliant to ISO 27001.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

A Threat Analysis Methodology for Smart Home Scenarios.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Systematic Derivation of Functional Safety Requirements for Automotive Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2014

A catalog of security requirements patterns for the domain of cloud computing systems.
Proceedings of the Symposium on Applied Computing, 2014

A meta-pattern and pattern form for context-patterns.
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014

Deriving a pattern language syntax for context-patterns.
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014

Analysis of Social Engineering Threats with Attack Graphs.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Trust-Aware Decision-Making Methodology for Cloud Sourcing.
Proceedings of the Advanced Information Systems Engineering, 2014

2013
Erratum to: A pattern-based method for establishing a cloud-specific information security management system.
Requir. Eng., 2013

A pattern-based method for establishing a cloud-specific information security management system - Establishing information security management systems for clouds considering security, privacy, and legal compliance.
Requir. Eng., 2013

Common criteria compliant software development (CC-CASD).
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

A structured and model-based hazard analysis and risk assessment method for automotive systems.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

A meta-model for context-patterns.
Proceedings of the 18th European Conference on Pattern Languages of Program, 2013

A Method for Re-using Existing ITIL Processes for Creating an ISO 27001 ISMS Process Applied to a High Availability Video Conferencing Cloud Scenario.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

A Problem-Based Threat Analysis in Compliance with Common Criteria.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Structured Pattern-Based Security Requirements Elicitation for Clouds.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

A Usability Evaluation of the NESSoS Common Body of Knowledge.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

2012
A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Supporting the context establishment according to ISO 27005 using patterns.
Proceedings of the Software Engineering 2012 - Workshopband, Fachtagung des GI-Fachbereichs Softwaretechnik, 27. Februar, 2012

A Pattern-Based Method for Identifying and Analyzing Laws.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012

Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Pattern-Based Context Establishment for Service-Oriented Architectures.
Proceedings of the Software Service and Application Engineering, 2012

Conducting a Privacy Impact Analysis for the Analysis of Communication Records.
Proceedings of the Perspectives in Business Informatics Research, 2012

A Problem-Based Approach for Computer-Aided Privacy Threat Identification.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

A Common Body of Knowledge for Engineering Secure Software and Services.
Proceedings of the Seventh International Conference on Availability, 2012

A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems.
Proceedings of the Seventh International Conference on Availability, 2012

A Foundation for Requirements Analysis of Privacy Preserving Software.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example.
Proceedings of the Seventh International Conference on Availability, 2012

Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation.
Proceedings of the Seventh International Conference on Availability, 2012

Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and Performance.
Proceedings of the Seventh International Conference on Availability, 2012

Ontology-Based Identification of Research Gaps and Immature Research Areas.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

Comparing Privacy Requirements Engineering Approaches.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Security and Compliance in Clouds.
Proceedings of the ISSE 2010, 2010

2009
Single-message denial-of-service attacks against voice-over-internet protocol terminals.
Int. J. Electron. Secur. Digit. Forensics, 2009


  Loading...