Kristian Beckers
Cited by
Cited by
A serious game for eliciting social engineering security requirements
K Beckers, S Pape
2016 IEEE 24th International Requirements Engineering Conference (RE), 16-25, 2016
A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering …
K Beckers, I Côté, S Faßbender, M Heisel, S Hofbauer
Requirements Engineering 18, 343-395, 2013
Pattern and Security Requirements
K Beckers, M Heisel, D Hatebur
Pattern Secur. Requir. Eng. Establ. Secur. Stand, 1-474, 2015
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
K Beckers, H Schmidt, JC Kuster, S Faßbender
2011 Sixth International Conference on Availability, Reliability and …, 2011
Social engineering defence mechanisms and counteracting training strategies
P Schaab, K Beckers, S Pape
Information & Computer Security 25 (2), 206-222, 2017
Comparing privacy requirements engineering approaches
K Beckers
2012 Seventh International Conference on Availability, Reliability and …, 2012
A problem-based approach for computer-aided privacy threat identification
K Beckers, S Faßbender, M Heisel, R Meis
Privacy Technologies and Policy: First Annual Privacy Forum, APF 2012 …, 2014
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system
K Beckers, M Heisel, B Solhaug, K Stølen
Engineering Secure Future Internet Services and Systems: Current Research …, 2014
A lightweight threat analysis approach intertwining safety and security for the automotive domain
J Dürrwang, K Beckers, R Kriesten
Computer Safety, Reliability, and Security: 36th International Conference …, 2017
Security attack analysis using attack patterns
T Li, E Paja, J Mylopoulos, J Horkoff, K Beckers
2016 IEEE Tenth International Conference on Research Challenges in …, 2016
Towards continuous security compliance in agile software development at scale
F Moyon, K Beckers, S Klepper, P Lachberger, B Bruegge
Proceedings of the 4th International Workshop on Rapid Continuous Software …, 2018
Analysis of social engineering threats with attack graphs
K Beckers, L Krautsevich, A Yautsiukhin
International Workshop on Data Privacy Management, 216-232, 2014
A catalog of security requirements patterns for the domain of cloud computing systems
K Beckers, I Côté, L Goeke
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 337-342, 2014
Identifying relevant information cues for vulnerability assessment using CVSS
L Allodi, S Banescu, H Femmer, K Beckers
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
A structured and model-based hazard analysis and risk assessment method for automotive systems
K Beckers, M Heisel, T Frese, D Hatebur
2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013
Using security requirements engineering approaches to support ISO 27001 information security management systems development and documentation
K Beckers, S Faßbender, M Heisel, H Schmidt
2012 seventh international conference on availability, reliability and …, 2012
PERSUADED: fighting social engineering attacks with a serious game
D Aladawy, K Beckers, S Pape
Trust, Privacy and Security in Digital Business: 15th International …, 2018
On the requirements for serious games geared towards software developers in the industry
TE Gasiba, K Beckers, S Suppan, F Rezabek
2019 IEEE 27th International Requirements Engineering Conference (RE), 286-296, 2019
HATCH: hack and trick capricious humans–a serious game on social engineering
K Beckers, S Pape, V Fries
Proceedings of British HCI, to appear, 2016
Systematic derivation of functional safety requirements for automotive systems
K Beckers, I Côté, T Frese, D Hatebur, M Heisel
Computer Safety, Reliability, and Security: 33rd International Conference …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20