Follow
Andreas L Opdahl
Title
Cited by
Cited by
Year
Eliciting security requirements with misuse cases
G Sindre, AL Opdahl
Requirements engineering 10, 34-44, 2005
15122005
Ontological evaluation of the UML using the Bunge–Wand–Weber model
AL Opdahl, B Henderson-Sellers
Software and systems modeling 1, 43-67, 2002
2902002
Templates for misuse case description
G Sindre, AL Opdahl
Proceedings of the 7th International Workshop on Requirements Engineering …, 2001
2672001
Named entity extraction for knowledge graphs: A literature overview
T Al-Moslmi, MG Ocaña, AL Opdahl, C Veres
IEEE Access 8, 32862-32881, 2020
2302020
Experimental comparison of attack trees and misuse cases for security threat identification
AL Opdahl, G Sindre
Information and Software Technology 51 (5), 916-932, 2009
1782009
From expert discipline to common practice: a vision and research agenda for extending the reach of enterprise modeling
K Sandkuhl, HG Fill, S Hoppenbrouwers, J Krogstie, F Matthes, A Opdahl, ...
Business & Information Systems Engineering 60, 69-80, 2018
1392018
Comparing risk identification techniques for safety and security requirements
C Raspotnig, A Opdahl
Journal of systems and software 86 (4), 1124-1151, 2013
1232013
A reuse-based approach to determining security requirements
G Sindre, DG Firesmith, AL Opdahl
Proc. 9th International Workshop on Requirements Engineering: Foundation for …, 2003
1222003
Research areas and challenges for mobile information systems
J Krogstie, K Lyytinen, AL Opdahl, B Pernici, K Siau, K Smolander
International Journal of Mobile Communications 2 (3), 220-234, 2004
1212004
Capturing security requirements through misuse cases
G Sindre, AL Opdahl
NIK 2001, Norsk Informatikkonferanse 2001, http://www. nik. no/2001 74, 2001
1132001
Ontological analysis of whole–part relationships in OO-models
AL Opdahl, B Henderson-Sellers, F Barbier
Information and Software Technology 43 (6), 387-399, 2001
1042001
Grounding the OML metamodel in ontology
AL Opdahl, B Henderson-Sellers
Journal of Systems and Software 57 (2), 119-143, 2001
962001
The unified enterprise modelling language—overview and further work
V Anaya, G Berio, M Harzallah, P Heymans, R Matulevičius, AL Opdahl, ...
Computers in Industry 61 (2), 99-111, 2010
922010
Responsible media technology and AI: challenges and research directions
C Trattner, D Jannach, E Motta, I Costera Meijer, N Diakopoulos, M Elahi, ...
AI and Ethics 2 (4), 585-594, 2022
812022
Conceptual modelling in information systems engineering
AL Opdahl
Springer, 2007
722007
A template for defining enterprise modelling constructs
AL Opdahl, B Henderson-Sellers
Journal of Database Management (JDM) 15 (2), 39-73, 2004
612004
Understanding the determinants of business process modelling in organisations
TR Eikebrokk, J Iden, DH Olsen, AL Opdahl
Business Process Management Journal 17 (4), 639-662, 2011
582011
Trustworthy journalism through AI
AL Opdahl, B Tessem, DT Dang-Nguyen, E Motta, V Setty, E Throndsen, ...
Data & Knowledge Engineering 146, 102182, 2023
572023
Big data and emergency management: concepts, methodologies, and applications
X Song, H Zhang, R Akerkar, H Huang, S Guo, L Zhong, Y Ji, AL Opdahl, ...
IEEE Transactions on Big Data 8 (2), 397-419, 2020
462020
Generalization/specialization as a structuring mechanism for misuse cases
G Sindre, AL Opdahl, GF Brevik
Proceedings of the 2nd symposium on requirements engineering for information …, 2002
452002
The system can't perform the operation now. Try again later.
Articles 1–20