Sven Türpe

Orcid: 0000-0001-8752-5691

According to our database1, Sven Türpe authored at least 18 papers between 2001 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
The Trouble with Security Requirements.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

Managing Security Work in Scrum: Tensions and Challenges.
Proceedings of the International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the 22nd European Symposium on Research in Computer Security (ESORICS 2017), 2017

Can Security Become a Routine?: A Study of Organizational Change in an Agile Software Development Group.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

2016
Penetration Tests a Turning Point in Security Practices? Organizational Challenges and Implications in a Software Development Team.
Proceedings of the 2nd Workshop on Security Information Workers, 2016

Idea: Usable Platforms for Secure Programming - Mining Unix for Insight and Guidelines.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

2014
Threat analysis in the software development lifecycle.
IBM J. Res. Dev., 2014

Denkverbote für Star-Trek-Computer?
Datenschutz und Datensicherheit, 2014

An Asset to Security Modeling?: Analyzing Stakeholder Collaborations Instead of Threats to Assets.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

2012
Electronic Identity Cards for User Authentication - Promise and Practice.
IEEE Secur. Priv., 2012

Point-and-shoot security design: can we build better tools for developers?
Proceedings of the New Security Paradigms Workshop, 2012

2011
Search-Based Application Security Testing: Towards a Structured Search Space.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

2010
Quantifying the Attack Surface of a Web Application.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

2009
Attacking the BitLocker Boot Process.
Proceedings of the Trusted Computing, 2009

What is the shape of your security policy?: security as a classification problem.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

2008
When it comes to Testing, is Usability the Closest Analogy to Security?
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

Security Testing: Turning Practice into Theory.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

2002
UNITE - An Agent-Oriented Teamwork Environment.
Proceedings of the Mobile Agents for Telecommunication Applications, 2002

2001
Kinderleicht wie ein Computerspiel? Versuch einer Analyse.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001


  Loading...