Dan Ionita
Dan Ionita
Geverifieerd e-mailadres voor utwente.nl - Homepage
Geciteerd door
Geciteerd door
Current established Risk Assessment methodologies and tools
D Ionita
University of Twente, 2013
A business ecosystem architecture modeling framework
RJ Wieringa, W Engelsman, J Gordijn, D Ionita
2019 IEEE 21st Conference on Business Informatics (CBI) 1, 147-156, 2019
Understanding online privacy—a systematic review of privacy visualizations and privacy by design guidelines
S Barth, D Ionita, P Hartel
ACM Computing Surveys (CSUR) 55 (3), 1-37, 2022
An information fusion approach for filtering GNSS data sets collected during construction operations
A Vasenev, N Pradhananga, FR Bijleveld, D Ionita, T Hartmann, J Teizer, ...
Advanced engineering informatics 28 (4), 297-310, 2014
Towards risk-driven security requirements management in agile software development
D Ionita, C van der Velden, HJK Ikkink, E Neven, M Daneva, M Kuipers
Information Systems Engineering in Responsible Information Systems: CAiSE …, 2019
Risk assessment as an argumentation game
H Prakken, D Ionita, R Wieringa
Computational Logic in Multi-Agent Systems: 14th International Workshop …, 2013
Threat analysis in systems-of-systems: an emergence-oriented approach
A Ceccarelli, T Zoppi, A Vasenev, M Mori, D Ionita, L Montoya, ...
ACM Transactions on Cyber-Physical Systems 3 (2), 1-24, 2018
Tangible modelling to elicit domain knowledge: an experiment and focus group
D Ionita, R Wieringa, JW Bullee, A Vasenev
Conceptual Modeling: 34th International Conference, ER 2015, Stockholm …, 2015
Argumentation-Based Security Requirements Elicitation: The Next Round
D Ionita, JW Bullee, RJ Wieringa
Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security …, 2014
Information fusion approach to increase the quality of GNSS data sets in construction equipment operations
A Vasenev, N Pradhananga, F Bijleveld, D Ionita, T Hartmann, J Teizer, ...
Advanced Engineering Informatics 28 (1), 297-310, 2014
Privacy rating: A user-centered approach for visualizing data handling practices of online services
S Barth, D Ionita, MDT De Jong, PH Hartel, M Junger
IEEE transactions on professional communication 64 (4), 354-373, 2021
Value-driven risk analysis of coordination models
D Ionita, J Gordijn, AS Yesuf, R Wieringa
The Practice of Enterprise Modeling: 9th IFIP WG 8.1. Working Conference …, 2016
Quantitative, value-driven risk analysis of e-services
D Ionita, R Wieringa, J Gordijn, AS Yesuf
Journal of information systems 33 (3), 45-60, 2019
Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids
A Vasenev, L Montoya, A Ceccarelli, A Le, D Ionita
Smart Grid Inspired Future Technologies: First International Conference …, 2017
Using value models for business risk analysis in e-service networks
D Ionita, RJ Wieringa, L Wolos, J Gordijn, W Pieters
IFIP Working Conference on The Practice of Enterprise Modeling, 239-253, 2015
Automated identification and prioritization of business risks in e-service networks
D Ionita, RJ Wieringa, J Gordijn
International Conference on Exploring Services Science, 547-560, 2016
Model-driven information security risk assessment of socio-technical systems
D Ionita
Arguesecure: out-of-the-box security risk assessment
D Ionita, R Kegel, A Baltuta, R Wieringa
2016 IEEE 24th international requirements engineering conference workshops …, 2016
Web-based Collaborative Security Requirements Elicitation.
D Ionita, RJ Wieringa
REFSQ Workshops, 2016
Investigating the usability and utility of tangible modelling of socio-technical architectures
D Ionita, R Wieringa, JW Bullee, A Vasenev
University of Twente, Enschede, Netherlands, 2015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20