Roman Wirtz

Affiliations:
  • University of Duisburg-Essen, Germany


According to our database1, Roman Wirtz authored at least 20 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Managing Security Risks During Requirements Engineering.
PhD thesis, 2021

P2P Frames: Pattern-based Characterization of Functional Requirements for Peer-to-peer Systems.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021

2020
Model-Based Threat Modeling for Cyber-Physical Systems: A Computer-Aided Approach.
Proceedings of the Software Technologies - 15th International Conference, 2020

Threat Modeling for Cyber-Physical Systems: A Two-dimensional Taxonomy Approach for Structuring Attack Actions.
Proceedings of the 15th International Conference on Software Technologies, 2020

Risk Identification: From Requirements to Threat Models.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Risk Treatment: An Iterative Method for Identifying Controls.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2020

Systematic Treatment of Security Risks during Requirements Engineering.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

2019
Combining Safety and Security in Autonomous Cars Using Blockchain Technologies.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Distributed Frames: Pattern-Based Characterization of Functional Requirements for Distributed Systems.
Proceedings of the Software Technologies - 14th International Conference, 2019

RE4DIST: Model-based Elicitation of Functional Requirements for Distributed Systems.
Proceedings of the 14th International Conference on Software Technologies, 2019

Managing security risks: template-based specification of controls.
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019

Pattern-based modeling of cyber-physical systems for analyzing security.
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019

Model-Based Risk Analysis and Evaluation Using CORAS and CVSS.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2019

CVSS-based Estimation and Prioritization for Security Risks.
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019

Systematic Asset Identification and Modeling During Requirements Engineering.
Proceedings of the Risks and Security of Internet and Systems, 2019

2018
Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams.
Proceedings of the Software Technologies - 13th International Conference, 2018

Problem-based Elicitation of Security Requirements - The ProCOR Method.
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018

Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2018

A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements.
Proceedings of the Risks and Security of Internet and Systems, 2018

2015
A Taxonomy of Requirements for the Privacy Goal Transparency.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015


  Loading...