Follow
Kristian Beckers
Title
Cited by
Cited by
Year
A serious game for eliciting social engineering security requirements
K Beckers, S Pape
2016 IEEE 24th International Requirements Engineering Conference (RE), 16-25, 2016
1242016
A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering …
K Beckers, I Côté, S Faßbender, M Heisel, S Hofbauer
Requirements Engineering 18, 343-395, 2013
782013
Pattern and Security Requirements
K Beckers, M Heisel, D Hatebur
Pattern Secur. Requir. Eng. Establ. Secur. Stand, 1-474, 2015
642015
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
K Beckers, H Schmidt, JC Kuster, S Faßbender
2011 Sixth International Conference on Availability, Reliability and …, 2011
632011
Social engineering defence mechanisms and counteracting training strategies
P Schaab, K Beckers, S Pape
Information & Computer Security 25 (2), 206-222, 2017
562017
Comparing privacy requirements engineering approaches
K Beckers
2012 Seventh International Conference on Availability, Reliability and …, 2012
562012
A problem-based approach for computer-aided privacy threat identification
K Beckers, S Faßbender, M Heisel, R Meis
Privacy Technologies and Policy: First Annual Privacy Forum, APF 2012 …, 2014
502014
A lightweight threat analysis approach intertwining safety and security for the automotive domain
J Dürrwang, K Beckers, R Kriesten
Computer Safety, Reliability, and Security: 36th International Conference …, 2017
442017
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system
K Beckers, M Heisel, B Solhaug, K Stølen
Engineering Secure Future Internet Services and Systems: Current Research …, 2014
432014
Security attack analysis using attack patterns
T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers
2016 IEEE Tenth International Conference on Research Challenges in …, 2016
412016
Towards continuous security compliance in agile software development at scale
F Moyon, K Beckers, S Klepper, P Lachberger, B Bruegge
Proceedings of the 4th International Workshop on Rapid Continuous Software …, 2018
372018
Analysis of social engineering threats with attack graphs
K Beckers, L Krautsevich, A Yautsiukhin
International Workshop on Data Privacy Management, 216-232, 2014
372014
A catalog of security requirements patterns for the domain of cloud computing systems
K Beckers, I Côté, L Goeke
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 337-342, 2014
352014
A structured and model-based hazard analysis and risk assessment method for automotive systems
K Beckers, M Heisel, T Frese, D Hatebur
2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013
342013
Identifying relevant information cues for vulnerability assessment using CVSS
L Allodi, S Banescu, H Femmer, K Beckers
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
312018
Using security requirements engineering approaches to support ISO 27001 information security management systems development and documentation
K Beckers, S Faßbender, M Heisel, H Schmidt
2012 seventh international conference on availability, reliability and …, 2012
302012
On the requirements for serious games geared towards software developers in the industry
TE Gasiba, K Beckers, S Suppan, F Rezabek
2019 IEEE 27th International Requirements Engineering Conference (RE), 286-296, 2019
292019
HATCH: hack and trick capricious humans–a serious game on social engineering
K Beckers, S Pape, V Fries
Proceedings of British HCI, to appear, 2016
292016
PERSUADED: fighting social engineering attacks with a serious game
D Aladawy, K Beckers, S Pape
Trust, Privacy and Security in Digital Business: 15th International …, 2018
282018
Systematic derivation of functional safety requirements for automotive systems
K Beckers, I Côté, T Frese, D Hatebur, M Heisel
Computer Safety, Reliability, and Security: 33rd International Conference …, 2014
282014
The system can't perform the operation now. Try again later.
Articles 1–20