Péter Kárpáti

According to our database1, Péter Kárpáti authored at least 23 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Applicability of AADL in modelling the overall I&C architecture of a nuclear power plant.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

2018
Combined Assessment of Software Safety and Security Requirements: An Industrial Evaluation of the CHASSIS Method.
J. Cases Inf. Technol., 2018

2015
Extending the UML Statecharts Notation to Model Security Aspects.
IEEE Trans. Software Eng., 2015

Investigating security threats in architectural context: Experimental evaluations of misuse case maps.
J. Syst. Softw., 2015

Investigating fulfilment of traceability requirements in a combined process for safety and security assessments.
Int. J. Crit. Comput. Based Syst., 2015

2014
Comparing attack trees and misuse cases in an industrial setting.
Inf. Softw. Technol., 2014

2013
Enhancing CHASSIS: A Method for Combining Safety and Security.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Requirements Management in a Combined Process for Safety and Security Assessments.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks.
Int. J. Secur. Softw. Eng., 2012

Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012

A comparative review of i<sup>∗</sup>-based and use case-based security modelling initiatives.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012

A Combined Process for Elicitation and Analysis of Safety and Security Requirements.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2012

2011
Characterising and Analysing Security Requirements Modelling Initiatives.
Proceedings of the Sixth International Conference on Availability, 2011

Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Visualizing Cyber Attacks with Misuse Case Maps.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010

Comparing Two Techniques for Intrusion Visualization.
Proceedings of the Practice of Enterprise Modeling - Third IFIP WG 8.1 Working Conference, 2010

Towards a Hacker Attack Representation Method.
Proceedings of the ICSOFT 2010, 2010

HARM: Hacker Attack Representation Method.
Proceedings of the Software and Data Technologies - 5th International Conference, 2010

2009
Designing and scaling distributed VoD servers.
Multim. Tools Appl., 2009

Computer-Mediated Mobile Messaging as Collaboration Support for Nurses.
Proceedings of the Medical Informatics in a United and Healthy Europe - Proceedings of MIE 2009, The XXIInd International Congress of the European Federation for Medical Informatics, Sarajevo, Bosnia and Herzegovina, August 30, 2009

Query-based requirements engineering for health care information systems: Examples and prospects.
Proceedings of the ICSE Workshop on Software Engineering in Health Care, 2009

2008
Designing and scaling proactive, self-organizing video servers: a formal and a simulation model.
PhD thesis, 2008

2005
Client Behaviour Prediction in a Proactive Video Server.
Proceedings of the Internet and Multimedia Systems and Applications, 2005


  Loading...