A serious game for eliciting social engineering security requirements K Beckers, S Pape 2016 IEEE 24th International Requirements Engineering Conference (RE), 16-25, 2016 | 141 | 2016 |
A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering … K Beckers, I Côté, S Faßbender, M Heisel, S Hofbauer Requirements Engineering 18, 343-395, 2013 | 83 | 2013 |
Social engineering defence mechanisms and counteracting training strategies P Schaab, K Beckers, S Pape Information & Computer Security 25 (2), 206-222, 2017 | 70 | 2017 |
Pattern and security requirements K Beckers, M Heisel, D Hatebur Pattern Secur. Requir. Eng. Establ. Secur. Stand, 1-474, 2015 | 70 | 2015 |
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing K Beckers, H Schmidt, JC Kuster, S Faßbender 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 67 | 2011 |
Comparing privacy requirements engineering approaches K Beckers 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 59 | 2012 |
A problem-based approach for computer-aided privacy threat identification K Beckers, S Faßbender, M Heisel, R Meis Privacy Technologies and Policy: First Annual Privacy Forum, APF 2012 …, 2014 | 57 | 2014 |
Security attack analysis using attack patterns T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers 2016 IEEE tenth international conference on research challenges in …, 2016 | 50 | 2016 |
A lightweight threat analysis approach intertwining safety and security for the automotive domain J Dürrwang, K Beckers, R Kriesten Computer Safety, Reliability, and Security: 36th International Conference …, 2017 | 47 | 2017 |
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system K Beckers, M Heisel, B Solhaug, K Stølen Engineering Secure Future Internet Services and Systems: Current Research …, 2014 | 47 | 2014 |
Towards continuous security compliance in agile software development at scale F Moyon, K Beckers, S Klepper, P Lachberger, B Bruegge Proceedings of the 4th International Workshop on Rapid Continuous Software …, 2018 | 45 | 2018 |
Identifying relevant information cues for vulnerability assessment using CVSS L Allodi, S Banescu, H Femmer, K Beckers Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 44 | 2018 |
Analysis of social engineering threats with attack graphs K Beckers, L Krautsevich, A Yautsiukhin International Workshop on Data Privacy Management, 216-232, 2014 | 39 | 2014 |
PERSUADED: fighting social engineering attacks with a serious game D Aladawy, K Beckers, S Pape Trust, Privacy and Security in Digital Business: 15th International …, 2018 | 38 | 2018 |
A structured and model-based hazard analysis and risk assessment method for automotive systems K Beckers, M Heisel, T Frese, D Hatebur 2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013 | 38 | 2013 |
How to integrate security compliance requirements with agile software engineering at scale? F Moyón, D Méndez, K Beckers, S Klepper Product-Focused Software Process Improvement: 21st International Conference …, 2020 | 37 | 2020 |
A catalog of security requirements patterns for the domain of cloud computing systems K Beckers, I Côté, L Goeke Proceedings of the 29th Annual ACM Symposium on Applied Computing, 337-342, 2014 | 36 | 2014 |
A structured comparison of security standards K Beckers, I Côté, S Fenz, D Hatebur, M Heisel Engineering secure future internet services and systems: Current research, 1-34, 2014 | 34 | 2014 |
On the requirements for serious games geared towards software developers in the industry TE Gasiba, K Beckers, S Suppan, F Rezabek 2019 IEEE 27th International Requirements Engineering Conference (RE), 286-296, 2019 | 32 | 2019 |
HATCH: hack and trick capricious humans–a serious game on social engineering K Beckers, S Pape, V Fries Proceedings of British HCI, to appear, 2016 | 32 | 2016 |