Vikash Katta

According to our database1, Vikash Katta authored at least 11 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Digital Twin for Cybersecurity Incident Prediction: A Multivocal Literature Review.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

What happens in a control room during a cybersecurity attack?: Preliminary observations from a pilot study.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

2015
Investigating fulfilment of traceability requirements in a combined process for safety and security assessments.
Int. J. Crit. Comput. Based Syst., 2015

2014
Survey Protocol: Traceability during Development of Systems with Safety and Security Implications - Importance, Tools, and Challenges.
Proceedings of the Joint Proceedings of REFSQ-2014 Workshops, 2014

2013
Applying a Security Conceptual Model for Coverage Analysis.
Proceedings of the 7th IFAC Conference on Manufacturing Modelling, Management, and Control, 2013

Enhancing CHASSIS: A Method for Combining Safety and Security.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Requirements Management in a Combined Process for Safety and Security Assessments.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A Combined Process for Elicitation and Analysis of Safety and Security Requirements.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2012

2010
Erratum to "Means-ends and whole-part traceability analysis of safety requirements" [J. Syst. Software 83 (2010) 1612-1621].
J. Syst. Softw., 2010

Means-ends and whole-part traceability analysis of safety requirements.
J. Syst. Softw., 2010

Comparing Two Techniques for Intrusion Visualization.
Proceedings of the Practice of Enterprise Modeling - Third IFIP WG 8.1 Working Conference, 2010


  Loading...