Artykuły udostępnione publicznie: - Riccardo ScandariatoWięcej informacji
Niedostępne w żadnym miejscu: 2
microsecend: A dataset of security-enriched dataflow diagrams for microservice applications
S Schneider, T Özen, M Chen, R Scandariato
2023 IEEE/ACM 20th International Conference on Mining Software Repositories …, 2023
Upoważnienia: European Commission
Striped: A threat analysis method for iot systems
K Srikumar, K Kashish, K Eggers, NE Díaz Ferreyra, J Koch, ...
Proceedings of the 17th International Conference on Availability …, 2022
Upoważnienia: European Commission
Dostępne w jakimś miejscu: 31
Flaws in flows: Unveiling design flaws via information flow analysis
K Tuma, R Scandariato, M Balliu
2019 IEEE International Conference on Software Architecture (ICSA), 191-200, 2019
Upoważnienia: Swedish Research Council
Vul4J: a dataset of reproducible Java vulnerabilities geared towards the study of program repair techniques
QC Bui, R Scandariato, NED Ferreyra
Proceedings of the 19th International Conference on Mining Software …, 2022
Upoważnienia: European Commission
From aspect-oriented models to aspect-oriented code? the maintenance perspective
A Hovsepyan, R Scandariato, S Van Baelen, Y Berbers, W Joosen
Proceedings of the 9th International Conference on Aspect-Oriented Software …, 2010
Upoważnienia: Research Foundation (Flanders)
Security assurance cases—state of the art of an emerging approach
M Mohamad, JP Steghöfer, R Scandariato
Empirical software engineering 26 (4), 70, 2021
Upoważnienia: Vinnova, Sweden
Evolution of security engineering artifacts: a state of the art survey
M Felderer, B Katt, P Kalb, J Jürjens, M Ochoa, F Paci, TT Tun, K Yskout, ...
Transportation Systems and Engineering: Concepts, Methodologies, Tools, and …, 2015
Upoważnienia: Austrian Science Fund, German Research Foundation
Microservice security metrics for secure communication, identity management, and observability
U Zdun, PJ Queval, G Simhandl, R Scandariato, S Chakravarty, M Jelic, ...
ACM transactions on software engineering and methodology 32 (1), 1-34, 2023
Upoważnienia: Austrian Science Fund, European Commission
Sok: Security of microservice applications: A practitioners’ perspective on challenges and best practices
P Billawa, A Bambhore Tukaram, NE Díaz Ferreyra, JP Steghöfer, ...
Proceedings of the 17th International Conference on Availability …, 2022
Upoważnienia: European Commission
Finding security threats that matter: Two industrial case studies
K Tuma, C Sandberg, U Thorsson, M Widman, T Herpel, R Scandariato
Journal of Systems and Software 179, 111003, 2021
Upoważnienia: Vinnova, Sweden
CONSERVE: A framework for the selection of techniques for monitoring containers security
R Jolak, T Rosenstatter, M Mohamad, K Strandberg, B Sangchoolie, ...
Journal of Systems and Software 186, 111158, 2022
Upoważnienia: Vinnova, Sweden
Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java
S Schneider, R Scandariato
Journal of Systems and Software 202, 111722, 2023
Upoważnienia: European Commission
APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities
QC Bui, R Paramitha, DL Vu, F Massacci, R Scandariato
Empirical software engineering 29 (1), 18, 2024
Upoważnienia: European Commission
Towards a security benchmark for the architectural design of microservice applications
A Bambhore Tukaram, S Schneider, NE Díaz Ferreyra, G Simhandl, ...
Proceedings of the 17th International Conference on Availability …, 2022
Upoważnienia: European Commission
Checking security compliance between models and code
K Tuma, S Peldszus, D Strüber, R Scandariato, J Jürjens
Software and systems modeling 22 (1), 273-296, 2023
Upoważnienia: German Research Foundation, European Commission
Precise analysis of purpose limitation in data flow diagrams
H Alshareef, K Tuma, S Stucki, G Schneider, R Scandariato
Proceedings of the 17th International Conference on Availability …, 2022
Upoważnienia: Swedish Research Council, European Commission
Human factors in developing automated vehicles: A requirements engineering perspective
AP Muhammad, E Knauss, J Bärgman
Journal of Systems and Software 205, 111810, 2023
Upoważnienia: European Commission
Cascade: An asset-driven approach to build security assurance cases for automotive systems
M Mohamad, R Jolak, Ö Askerdal, JP Steghöfer, R Scandariato
ACM transactions on cyber-physical systems 7 (1), 1-26, 2023
Upoważnienia: Vinnova, Sweden
Conversational devbots for secure programming: An empirical study on skf chatbot
C Tony, M Balasubramanian, NE Díaz Ferreyra, R Scandariato
Proceedings of the 26th International Conference on Evaluation and …, 2022
Upoważnienia: European Commission
How dataflow diagrams impact software security analysis: an empirical experiment
S Schneider, NED Ferreyra, PJ Queval, G Simhandl, U Zdun, ...
2024 IEEE International Conference on Software Analysis, Evolution and …, 2024
Upoważnienia: European Commission
Informacje na temat publikacji i finansowania automatycznie określa program komputerowy