Results 1-20 of 28

Issue DateTitleTypeAuthor(s)
1Nov-2019Towards automated security design flaw detectionChapter/Article (Proceedings)Sion, Laurens ; Tuma, Katja ; Scandariato, Riccardo ; Yskout, Koen ; Joosen, Wouter 
2Sep-2018A lingua franca for security by designChapter/Article (Proceedings)Van Den Berghe, Alexander ; Yskout, Koen ; Scandariato, Riccardo ; Joosen, Wouter 
31-Jul-2017Design notations for secure software: a systematic literature reviewArticleVan Den Berghe, Alexander ; Scandariato, Riccardo ; Yskout, Koen ; Joosen, Wouter 
4May-2017A model for provably secure software designChapter/Article (Proceedings)Van Den Berghe, Alexander ; Yskout, Koen ; Joosen, Wouter ; Scandariato, Riccardo 
53-Apr-2017A modular meta-model for security solutionsChapter/Article (Proceedings)Sion, Laurens ; Yskout, Koen ; Scandariato, Riccardo ; Joosen, Wouter 
62017Empirical research on security and privacy by design: What (not) to expect as a researcher or a reviewerChapter (Book)Yskout, Koen ; Wuyts, Kim ; Landuyt, Dimitri van ; Scandariato, Riccardo ; Joosen, Wouter 
7Sep-2016Is newer always better?: The case of vulnerability prediction modelsChapter/Article (Proceedings)Hovsepyan, Aram ; Scandariato, Riccardo ; Joosen, Wouter 
8May-2015Do security patterns really help designers?Chapter/Article (Proceedings)Yskout, Koen ; Scandariato, Riccardo ; Joosen, Wouter 
9May-2015MASC: Modelling architectural security concernsChapter/Article (Proceedings)Sion, Laurens ; Yskout, Koen ; Van Den Berghe, Alexander ; Scandariato, Riccardo ; Joosen, Wouter 
101-Oct-2014Predicting vulnerable software components via text miningArticleScandariato, Riccardo ; Walden, James ; Hovsepyan, Aram ; Joosen, Wouter 
112-Jun-2014Empirical evaluation of a privacy-focused threat modeling methodologyArticleWuyts, Kim ; Scandariato, Riccardo ; Joosen, Wouter 
122014Empirical assessment of security requirements and architecture: lessons learnedArticleScandariato, Riccardo ; Paci, Federica ; Tran, Le Minh Sang ; Labunets, Katsiaryna ; Yskout, Koen ; Massacci, Fabio ; Joosen, Wouter 
133-Dec-2013A descriptive study of Microsoft’s threat modeling techniqueArticleScandariato, Riccardo ; Wuyts, Kim ; Joosen, Wouter 
14Nov-2013Static analysis versus penetration testing: a controlled experimentChapter/Article (Proceedings)Scandariato, Riccardo ; Walden, James ; Joosen, Wouter 
15Feb-2013Towards a systematic literature review on secure software designChapter/Article (Proceedings)Van Den Berghe, Alexander ; Scandariato, Riccardo ; Joosen, Wouter 
16Sep-2012Software vulnerability prediction using text analysis techniquesChapter/Article (Proceedings)Hovsepyan, Aram ; Scandariato, Riccardo ; Joosen, Wouter ; Walden, James 
1723-Aug-2012Change patterns: Co-evolving requirements and architectureArticleYskout, Koen ; Scandariato, Riccardo ; Joosen, Wouter 
18Aug-2012Reusable formal models for secure software architecturesChapter/Article (Proceedings)Heyman, Tom ; Scandariato, Riccardo ; Joosen, Wouter 
19Jun-2012Does organizing security patterns focus architectural choices?Chapter/Article (Proceedings)Yskout, Koen ; Scandariato, Riccardo ; Joosen, Wouter 
209-Nov-2011Least privilege analysis in software architecturesArticleBuyens, Koen ; Scandariato, Riccardo ; Joosen, Wouter