Author of the publication

Modeling Structured and Unstructured Processes: An Empirical Evaluation.

, , , , and . ER, volume 9974 of Lecture Notes in Computer Science, page 347-361. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment., , , , , and . FDSE, volume 10646 of Lecture Notes in Computer Science, page 23-39. Springer, (2017)Assessing the effect of learning styles on risk model comprehensibility: A controlled experiment (short paper)., and . REFSQ Workshops, volume 2376 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Graphical vs. Tabular Notations for Risk Models: On the Role of Textual Labels and Complexity., , and . ESEM, page 267-276. IEEE Computer Society, (2017)No search allowed: what risk modeling notation to choose?. ESEM, page 20:1-20:10. ACM, (2018)The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals., , , , and . REFSQ, volume 9013 of Lecture Notes in Computer Science, page 98-114. Springer, (2015)An experiment on comparing textual vs. visual industrial methods for security risk assessment., , , and . EmpiRE, page 28-35. IEEE Computer Society, (2014)An Adversarial Risk Analysis Framework for Cybersecurity., , , , , and . CoRR, (2019)Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context., , , , and . USENIX Security Symposium, page 3433-3450. USENIX Association, (2022)An Evaluation of the Product Security Maturity Model Through Case Studies at 15 Software Producing Organizations., , , , and . ICSOB, volume 500 of Lecture Notes in Business Information Processing, page 327-343. Springer, (2023)Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations., , , , and . ICSE, page 395. ACM, (2018)