Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relationship-based threat modeling., , , and . EnCyCriS@ICSE, page 41-48. ACM, (2022)Security Threat Modeling: Are Data Flow Diagrams Enough?, , , , and . ICSE (Workshops), page 254-257. ACM, (2020)Threat modeling at run time: the case for reflective and adaptive threat management (NIER track)., , , and . SEAMS@ICSE, page 203-209. IEEE, (2021)An Overview of Runtime Data Protection Enforcement Approaches., , and . EuroS&P Workshops, page 351-358. IEEE, (2021)Security and Privacy Threat Analysis for Solid., , , , , and . SecDev, page 196-206. IEEE, (2023)On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications., , , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 195-203. Springer, (2019)Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation., , , and . IEEE Symposium on Security and Privacy Workshops, page 80-83. IEEE, (2019)Automating the early detection of security design flaws., , , and . MoDELS, page 332-342. ACM, (2020)Mitigation lost in translation: leveraging threat information to improve privacy solution selection., , , , , and . SAC, page 1236-1247. ACM, (2022)The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment., , , and . DETIPS/DeSECSys/MPS/SPOSE@ESORICS, volume 12580 of Lecture Notes in Computer Science, page 283-293. Springer, (2020)