Follow
Yudistira Asnar
Title
Cited by
Cited by
Year
Goal-driven risk assessment in requirements engineering
Y Asnar, P Giorgini, J Mylopoulos
Requirements Engineering 16, 101-116, 2011
1552011
Modelling risk and identifying countermeasure in organizations
Y Asnar, P Giorgini
Critical Information Infrastructures Security: First International Workshop …, 2006
1132006
From trust to dependability through risk analysis
Y Asnar, P Giorgini, F Massacci, N Zannone
The Second International Conference on Availability, Reliability and …, 2007
932007
Analyzing business continuity through a multi-layers model
Y Asnar, P Giorgini
International Conference on Business Process Management, 212-227, 2008
462008
Risk as dependability metrics for the evaluation of business solutions: a model-driven approach
Y Asnar, R Moretti, M Sebastianis, N Zannone
2008 Third International Conference on Availability, Reliability and …, 2008
432008
Perceived risk assessment
Y Asnar, N Zannone
Proceedings of the 4th ACM Workshop on Quality of Protection, 59-64, 2008
332008
A method for security governance, risk, and compliance (GRC): A goal-process approach
Y Asnar, F Massacci
International School on Foundations of Security Analysis and Design, 152-184, 2011
282011
Secure and dependable patterns in organizations: An empirical approach
Y Asnar, P Giorgini, F Massacci, A Saidane, R Bonato, V Meduri, ...
15th IEEE International Requirements Engineering Conference (RE 2007), 287-292, 2007
272007
Using risk analysis to evaluate design alternatives
Y Asnar, V Bryl, P Giorgini
Agent-Oriented Software Engineering VII: 7th International Workshop, AOSE …, 2007
272007
Risk modelling and reasoning in goal models
Y Asnar, P Giorgini, J Mylopoulos
Università degli Studi di Trento-Dipartimento di Informatica e Telecomunicazioni, 2006
272006
A continuous fusion authentication for Android based on keystroke dynamics and touch gesture
AN Putri, YDW Asnar, S Akbar
2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016
232016
Risk analysis as part of the requirements engineering process
Y Asnar, P Giorgini
University of Trento, 2007
232007
Computer aided threat identification
Y Asnar, T Li, F Massacci, F Paci
2011 IEEE 13th Conference on Commerce and Enterprise Computing, 145-152, 2011
192011
A vulnerability scanning tool for session management vulnerabilities
R Lukanta, Y Asnar, AI Kistijantoro
2014 International conference on data and software engineering (ICODSE), 1-6, 2014
172014
Web application fuzz testing
I Andrianto, MMI Liem, YDW Asnar
2017 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2017
152017
Applying tropos to socio-technical system design and runtime configuration
F Dalpiaz, R Ali, Y Asnar, V Bryl, P Giorgini
152008
Fraud detection based-on data mining on Indonesian E-Procurement System (SPSE)
HA Arief, GAP Saptawati, YDW Asnar
2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016
142016
Vulnerability detection in php web application using lexical analysis approach with machine learning
DR Anbiya, A Purwarianti, Y Asnar
2018 5th International Conference on Data and Software Engineering (ICoDSE), 1-6, 2018
122018
Static code analysis tools with the taint analysis method for detecting web application vulnerability
AF Maskur, YDW Asnar
2019 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2019
102019
Realizing Trustworthy Business Services Through a New GRC Approach
Y Asnar, HW Lim, F Massacci, C Worledge
ISACA - JOnline 2, 2010
10*2010
The system can't perform the operation now. Try again later.
Articles 1–20