


default search action
Riccardo Scandariato
Person information
- affiliation: Hamburg University of Technology, Germany
- affiliation: University of Gothenburg, Sweden
- affiliation: Chalmers University of Technology, Sweden
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j29]Kevin Hermann [j29]Kevin Hermann , Simon Schneider , Simon Schneider , Catherine Tony , Catherine Tony , Asli Yardim , Asli Yardim , Sven Peldszus , Sven Peldszus , Thorsten Berger , Thorsten Berger , Riccardo Scandariato , Riccardo Scandariato , M. Angela Sasse , M. Angela Sasse , Alena Naiakshina , Alena Naiakshina : :
 A taxonomy of functional security features and how they can be located. Empir. Softw. Eng. 30(5): 117 (2025)
 [j28]Simon Schneider [j28]Simon Schneider , Alexander Bakhtin , Alexander Bakhtin , Xiaozhou Li , Xiaozhou Li , Jacopo Soldani , Jacopo Soldani , Antonio Brogi , Antonio Brogi , Tomás Cerný , Tomás Cerný , Riccardo Scandariato , Riccardo Scandariato , Davide Taibi , Davide Taibi : :
 Comparison of static analysis architecture recovery tools for microservice applications. Empir. Softw. Eng. 30(5): 128 (2025)
 [j27]Evangelos Ntentos [j27]Evangelos Ntentos , Nicole Elisabeth Lueger , Nicole Elisabeth Lueger , Georg Simhandl , Georg Simhandl , Uwe Zdun , Uwe Zdun , Simon Schneider , Simon Schneider , Riccardo Scandariato , Riccardo Scandariato , Nicolás E. Díaz Ferreyra: , Nicolás E. Díaz Ferreyra:
 On the Understandability of Design-Level Security Practices in Infrastructure-as-Code Scripts and Deployment Architectures. ACM Trans. Softw. Eng. Methodol. 34(1): 6:1-6:37 (2025)
 [c81]Simon Schneider [c81]Simon Schneider , Komal Kashish, Katja Tuma , Komal Kashish, Katja Tuma , Riccardo Scandariato , Riccardo Scandariato : :
 In Specs We Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks. ARES (1) 2025: 278-300
 [c80]Nicolás E. Díaz Ferreyra, Sirine Khelifi, Nalin A. G. Arachchilage, Riccardo Scandariato: [c80]Nicolás E. Díaz Ferreyra, Sirine Khelifi, Nalin A. G. Arachchilage, Riccardo Scandariato:
 The Good, the Bad, and the (Un)Usable: a Rapid Literature Review on Privacy as Code. CHASE@ICSE 2025: 173-178
 [d3]Simon Schneider, Alexander Bakhtin, Xiaozhou Li [d3]Simon Schneider, Alexander Bakhtin, Xiaozhou Li , Jacopo Soldani , Jacopo Soldani , Antonio Brogi , Antonio Brogi , Tomás Cerný , Tomás Cerný , Riccardo Scandariato , Riccardo Scandariato , Davide Taibi , Davide Taibi : :
 M3SOulu/EMSE2025SAR-Replication: Release v1.1. Version v1.1. Zenodo, 2025 [all versions] 
 [i30]Kevin Hermann, Simon Schneider, Catherine Tony, Asli Yardim, Sven Peldszus, Thorsten Berger, Riccardo Scandariato, M. Angela Sasse, Alena Naiakshina: [i30]Kevin Hermann, Simon Schneider, Catherine Tony, Asli Yardim, Sven Peldszus, Thorsten Berger, Riccardo Scandariato, M. Angela Sasse, Alena Naiakshina:
 A Taxonomy of Functional Security Features and How They Can Be Located. CoRR abs/2501.04454 (2025)
 [i29]Emanuele Iannone, Quang-Cuong Bui, Riccardo Scandariato: [i29]Emanuele Iannone, Quang-Cuong Bui, Riccardo Scandariato:
 A Match Made in Heaven? Matching Test Cases and Vulnerabilities With the VUTECO Approach. CoRR abs/2502.03365 (2025)
 [i28]Quang-Cuong Bui, Emanuele Iannone, Maria Camporese, Torge Hinrichs, Catherine Tony, László Tóth, Fabio Palomba, Péter Hegedüs, Fabio Massacci, Riccardo Scandariato: [i28]Quang-Cuong Bui, Emanuele Iannone, Maria Camporese, Torge Hinrichs, Catherine Tony, László Tóth, Fabio Palomba, Péter Hegedüs, Fabio Massacci, Riccardo Scandariato:
 A Systematic Literature Review on Automated Exploit and Security Test Generation. CoRR abs/2502.04953 (2025)
 [i27]Simon Schneider, Komal Kashish, Katja Tuma, Riccardo Scandariato: [i27]Simon Schneider, Komal Kashish, Katja Tuma, Riccardo Scandariato:
 In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks. CoRR abs/2502.09117 (2025)
- 2024
 [j26]Quang-Cuong Bui [j26]Quang-Cuong Bui , Ranindya Paramitha , Ranindya Paramitha , Duc-Ly Vu , Duc-Ly Vu , Fabio Massacci , Fabio Massacci , Riccardo Scandariato , Riccardo Scandariato : :
 APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities. Empir. Softw. Eng. 29(1): 18 (2024)
 [j25]Mazen Mohamad [j25]Mazen Mohamad , Jan-Philipp Steghöfer , Jan-Philipp Steghöfer , Eric Knauss , Eric Knauss , Riccardo Scandariato , Riccardo Scandariato : :
 Managing security evidence in safety-critical organizations. J. Syst. Softw. 214: 112082 (2024)
 [j24]Nicolás E. Díaz Ferreyra, Melina C. Vidoni, Maritta Heisel, Riccardo Scandariato: [j24]Nicolás E. Díaz Ferreyra, Melina C. Vidoni, Maritta Heisel, Riccardo Scandariato:
 Cybersecurity discussions in Stack Overflow: a developer-centred analysis of engagement and self-disclosure behaviour. Soc. Netw. Anal. Min. 14(1): 16 (2024)
 [j23]Uwe Zdun [j23]Uwe Zdun , Pierre-Jean Queval , Pierre-Jean Queval , Georg Simhandl , Georg Simhandl , Riccardo Scandariato , Riccardo Scandariato , Somik Chakravarty , Somik Chakravarty , Marjan Jelic , Marjan Jelic , Aleksandar S. Jovanovic , Aleksandar S. Jovanovic : :
 Detection Strategies for Microservice Security Tactics. IEEE Trans. Dependable Secur. Comput. 21(3): 1257-1273 (2024)
 [c79]Clinton Cao [c79]Clinton Cao , Simon Schneider , Simon Schneider , Nicolás E. Díaz Ferreyra , Nicolás E. Díaz Ferreyra , Sicco Verwer , Sicco Verwer , Annibale Panichella , Annibale Panichella , Riccardo Scandariato , Riccardo Scandariato : :
 CATMA: Conformance Analysis Tool For Microservice Applications. ICSE Companion 2024: 59-63
 [c78]Nicolás E. Díaz Ferreyra [c78]Nicolás E. Díaz Ferreyra , Mojtaba Shahin , Mojtaba Shahin , Mansooreh Zahedi , Mansooreh Zahedi , Sodiq Quadri , Sodiq Quadri , Riccardo Scandariato , Riccardo Scandariato : :
 What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study. MSR 2024: 704-715
 [c77]Simon Schneider, Ananya Saha, Emanuele Mezzi [c77]Simon Schneider, Ananya Saha, Emanuele Mezzi , Katja Tuma , Katja Tuma , Riccardo Scandariato: , Riccardo Scandariato:
 Designing Secure AI-based Systems: a Multi-Vocal Literature Review. SecDev 2024: 13-19
 [c76]Simon Schneider, Nicolás E. Díaz Ferreyra, Pierre-Jean Quéval, Georg Simhandl, Uwe Zdun, Riccardo Scandariato: [c76]Simon Schneider, Nicolás E. Díaz Ferreyra, Pierre-Jean Quéval, Georg Simhandl, Uwe Zdun, Riccardo Scandariato:
 How Dataflow Diagrams Impact Software Security Analysis: an Empirical Experiment. SANER 2024: 952-963
 [d2]Simon Schneider, Alexander Bakhtin, Xiaozhou Li [d2]Simon Schneider, Alexander Bakhtin, Xiaozhou Li , Jacopo Soldani , Jacopo Soldani , Antonio Brogi , Antonio Brogi , Tomás Cerný , Tomás Cerný , Riccardo Scandariato , Riccardo Scandariato , Davide Taibi , Davide Taibi : :
 M3SOulu/SARbenchmarks: Replication Package. Version v1.0. Zenodo, 2024 [all versions] 
 [i26]Simon Schneider, Nicolás E. Díaz Ferreyra, Pierre-Jean Quéval, Georg Simhandl, Uwe Zdun, Riccardo Scandariato: [i26]Simon Schneider, Nicolás E. Díaz Ferreyra, Pierre-Jean Quéval, Georg Simhandl, Uwe Zdun, Riccardo Scandariato:
 How Dataflow Diagrams Impact Software Security Analysis: an Empirical Experiment. CoRR abs/2401.04446 (2024)
 [i25]Clinton Cao, Simon Schneider, Nicolás E. Díaz Ferreyra, Sicco Verwer, Annibale Panichella, Riccardo Scandariato: [i25]Clinton Cao, Simon Schneider, Nicolás E. Díaz Ferreyra, Sicco Verwer, Annibale Panichella, Riccardo Scandariato:
 CATMA: Conformance Analysis Tool For Microservice Applications. CoRR abs/2401.09838 (2024)
 [i24]Nicolás E. Díaz Ferreyra, Mojtaba Shahin, Mansooreh Zahedi, Sodiq Quadri, Riccardo Scandariato: [i24]Nicolás E. Díaz Ferreyra, Mojtaba Shahin, Mansooreh Zahedi, Sodiq Quadri, Riccardo Scandariato:
 What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study. CoRR abs/2401.12768 (2024)
 [i23]Simon Schneider, Alexander Bakhtin [i23]Simon Schneider, Alexander Bakhtin , Xiaozhou Li, Jacopo Soldani, Antonio Brogi , Xiaozhou Li, Jacopo Soldani, Antonio Brogi , Tomás Cerný, Riccardo Scandariato, Davide Taibi: , Tomás Cerný, Riccardo Scandariato, Davide Taibi:
 Comparison of Static Analysis Architecture Recovery Tools for Microservice Applications. CoRR abs/2403.06941 (2024)
 [i22]Mazen Mohamad, Jan-Philipp Steghöfer, Eric Knauss, Riccardo Scandariato: [i22]Mazen Mohamad, Jan-Philipp Steghöfer, Eric Knauss, Riccardo Scandariato:
 Managing Security Evidence in Safety-Critical Organizations. CoRR abs/2404.17332 (2024)
 [i21]Catherine Tony, Nicolás E. Díaz Ferreyra, Markus Mutas, Salem Dhiff, Riccardo Scandariato: [i21]Catherine Tony, Nicolás E. Díaz Ferreyra, Markus Mutas, Salem Dhiff, Riccardo Scandariato:
 Prompting Techniques for Secure Code Generation: A Systematic Investigation. CoRR abs/2407.07064 (2024)
 [i20]Simon Schneider, Ananya Saha, Emanuele Mezzi, Katja Tuma [i20]Simon Schneider, Ananya Saha, Emanuele Mezzi, Katja Tuma , Riccardo Scandariato: , Riccardo Scandariato:
 Designing Secure AI-based Systems: a Multi-Vocal Literature Review. CoRR abs/2407.18584 (2024)
 [i19]Simon Schneider, Alexander Bakhtin, Xiaozhou Li, Jacopo Soldani, Antonio Brogi, Tomás Cerný, Riccardo Scandariato, Davide Taibi: [i19]Simon Schneider, Alexander Bakhtin, Xiaozhou Li, Jacopo Soldani, Antonio Brogi, Tomás Cerný, Riccardo Scandariato, Davide Taibi:
 Comparison of Static Analysis Architecture Recovery Tools for Microservice Applications. CoRR abs/2412.08352 (2024)
 [i18]Nicolás E. Díaz Ferreyra, Sirine Khelifi, Nalin A. G. Arachchilage, Riccardo Scandariato: [i18]Nicolás E. Díaz Ferreyra, Sirine Khelifi, Nalin A. G. Arachchilage, Riccardo Scandariato:
 The Good, the Bad, and the (Un)Usable: A Rapid Literature Review on Privacy as Code. CoRR abs/2412.16667 (2024)
- 2023
 [j22]Simon Schneider [j22]Simon Schneider , Riccardo Scandariato: , Riccardo Scandariato:
 Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java. J. Syst. Softw. 202: 111722 (2023)
 [j21]Katja Tuma [j21]Katja Tuma , Sven Peldszus , Sven Peldszus , Daniel Strüber, Riccardo Scandariato, Jan Jürjens: , Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
 Checking security compliance between models and code. Softw. Syst. Model. 22(1): 273-296 (2023)
 [j20]Mazen Mohamad [j20]Mazen Mohamad , Rodi Jolak , Rodi Jolak , Örjan Askerdal , Örjan Askerdal , Jan-Philipp Steghöfer , Jan-Philipp Steghöfer , Riccardo Scandariato , Riccardo Scandariato : :
 CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems. ACM Trans. Cyber Phys. Syst. 7(1): 3:1-3:26 (2023)
 [j19]Uwe Zdun [j19]Uwe Zdun , Pierre-Jean Queval , Pierre-Jean Queval , Georg Simhandl , Georg Simhandl , Riccardo Scandariato , Riccardo Scandariato , Somik Chakravarty , Somik Chakravarty , Marjan Jelic , Marjan Jelic , Aleksandar S. Jovanovic , Aleksandar S. Jovanovic : :
 Microservice Security Metrics for Secure Communication, Identity Management, and Observability. ACM Trans. Softw. Eng. Methodol. 32(1): 16:1-16:34 (2023)
 [c75]Nicolás Emilio Díaz Ferreyra [c75]Nicolás Emilio Díaz Ferreyra , Gautam Kishore Shahi , Gautam Kishore Shahi , Catherine Tony , Catherine Tony , Stefan Stieglitz , Stefan Stieglitz , Riccardo Scandariato , Riccardo Scandariato : :
 Regret, Delete, (Do Not) Repeat: An Analysis of Self-Cleaning Practices on Twitter After the Outbreak of the COVID-19 Pandemic. CHI Extended Abstracts 2023: 246:1-246:7
 [c74]Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina C. Vidoni, Riccardo Scandariato: [c74]Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina C. Vidoni, Riccardo Scandariato:
 Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms. CHASE 2023: 105-110
 [c73]Quang-Cuong Bui [c73]Quang-Cuong Bui , Malte Laukötter, Riccardo Scandariato: , Malte Laukötter, Riccardo Scandariato:
 DockerCleaner: Automatic Repair of Security Smells in Dockerfiles. ICSME 2023: 160-170
 [c72]Simon Schneider, Tufan Özen, Michael Chen, Riccardo Scandariato: [c72]Simon Schneider, Tufan Özen, Michael Chen, Riccardo Scandariato:
 microSecEnD: A Dataset of Security-Enriched Dataflow Diagrams for Microservice Applications. MSR 2023: 125-129
 [c71]Catherine Tony, Markus Mutas [c71]Catherine Tony, Markus Mutas , Nicolás E. Díaz Ferreyra, Riccardo Scandariato: , Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
 LLMSecEval: A Dataset of Natural Language Prompts for Security Evaluations. MSR 2023: 588-592
 [d1]Nicolás E. Díaz Ferreyra [d1]Nicolás E. Díaz Ferreyra , Gautam Kishore Shahi , Gautam Kishore Shahi , Catherine Tony , Catherine Tony , Stefan Stieglitz , Stefan Stieglitz , Riccardo Scandariato , Riccardo Scandariato : :
 nicoediaz/RegretCovid: Initial Release. Zenodo, 2023 
 [i17]Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina C. Vidoni, Riccardo Scandariato: [i17]Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina C. Vidoni, Riccardo Scandariato:
 Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms. CoRR abs/2303.01822 (2023)
 [i16]Nicolás E. Díaz Ferreyra, Gautam Kishore Shahi, Catherine Tony, Stefan Stieglitz, Riccardo Scandariato: [i16]Nicolás E. Díaz Ferreyra, Gautam Kishore Shahi, Catherine Tony, Stefan Stieglitz, Riccardo Scandariato:
 Regret, Delete, (Do Not) Repeat: An Analysis of Self-Cleaning Practices on Twitter After the Outbreak of the COVID-19 Pandemic. CoRR abs/2303.09135 (2023)
 [i15]Catherine Tony, Markus Mutas, Nicolás E. Díaz Ferreyra, Riccardo Scandariato: [i15]Catherine Tony, Markus Mutas, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
 LLMSecEval: A Dataset of Natural Language Prompts for Security Evaluations. CoRR abs/2303.09384 (2023)
 [i14]Simon Schneider, Riccardo Scandariato: [i14]Simon Schneider, Riccardo Scandariato:
 Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice Applications written in Java. CoRR abs/2304.12769 (2023)
- 2022
 [j18]Rodi Jolak [j18]Rodi Jolak , Thomas Rosenstatter , Thomas Rosenstatter , Mazen Mohamad , Mazen Mohamad , Kim Strandberg , Kim Strandberg , Behrooz Sangchoolie , Behrooz Sangchoolie , Nasser Nowdehi , Nasser Nowdehi , Riccardo Scandariato: , Riccardo Scandariato:
 CONSERVE: A framework for the selection of techniques for monitoring containers security. J. Syst. Softw. 186: 111158 (2022)
 [c70]Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra [c70]Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra , Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl: , Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl:
 SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices. ARES 2022: 9:1-9:10
 [c69]Hanaa Alshareef, Katja Tuma, Sandro Stucki, Gerardo Schneider, Riccardo Scandariato: [c69]Hanaa Alshareef, Katja Tuma, Sandro Stucki, Gerardo Schneider, Riccardo Scandariato:
 Precise Analysis of Purpose Limitation in Data Flow Diagrams. ARES 2022: 17:1-17:11
 [c68]Kamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra [c68]Kamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra , Julian Koch , Julian Koch , Thorsten Schüppstuhl , Thorsten Schüppstuhl , Riccardo Scandariato: , Riccardo Scandariato:
 STRIPED: A Threat Analysis Method for IoT Systems. ARES 2022: 96:1-96:6
 [c67]Anusha Bambhore Tukaram, Simon Schneider, Nicolás E. Díaz Ferreyra [c67]Anusha Bambhore Tukaram, Simon Schneider, Nicolás E. Díaz Ferreyra , Georg Simhandl, Uwe Zdun, Riccardo Scandariato: , Georg Simhandl, Uwe Zdun, Riccardo Scandariato:
 Towards a Security Benchmark for the Architectural Design of Microservice Applications. ARES 2022: 116:1-116:7
 [c66]Catherine Tony [c66]Catherine Tony , Mohana Balasubramanian, Nicolás E. Díaz Ferreyra , Mohana Balasubramanian, Nicolás E. Díaz Ferreyra , Riccardo Scandariato: , Riccardo Scandariato:
 Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot. EASE 2022: 276-281
 [c65]Rodi Jolak [c65]Rodi Jolak , Thomas Rosenstatter, Saif Aldaghistani, Riccardo Scandariato: , Thomas Rosenstatter, Saif Aldaghistani, Riccardo Scandariato:
 RIPOSTE: A Collaborative Cyber Attack Response Framework for Automotive Systems. SEAA 2022: 350-357
 [c64]Eduard Pinconschi, Quang-Cuong Bui [c64]Eduard Pinconschi, Quang-Cuong Bui , Rui Abreu , Rui Abreu , Pedro Adão , Pedro Adão , Riccardo Scandariato: , Riccardo Scandariato:
 Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities. ISSTA 2022: 789-792
 [c63]Quang-Cuong Bui [c63]Quang-Cuong Bui , Riccardo Scandariato, Nicolás E. Díaz Ferreyra , Riccardo Scandariato, Nicolás E. Díaz Ferreyra : :
 Vul4J: A Dataset of Reproducible Java Vulnerabilities Geared Towards the Study of Program Repair Techniques. MSR 2022: 464-468
 [c62]Mazen Mohamad [c62]Mazen Mohamad , Jan-Philipp Steghöfer, Alexander Åström , Jan-Philipp Steghöfer, Alexander Åström , Riccardo Scandariato: , Riccardo Scandariato:
 Identifying security-related requirements in regulatory documents based on cross-project classification. PROMISE 2022: 82-91
 [c61]Catherine Tony [c61]Catherine Tony , Nicolás E. Díaz Ferreyra , Nicolás E. Díaz Ferreyra , Riccardo Scandariato: , Riccardo Scandariato:
 GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences. QRS 2022: 896-906
 [i13]Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl: [i13]Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl:
 Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices. CoRR abs/2202.01612 (2022)
 [i12]Catherine Tony, Mohana Balasubramanian, Nicolás E. Díaz Ferreyra, Riccardo Scandariato: [i12]Catherine Tony, Mohana Balasubramanian, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
 Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot. CoRR abs/2205.06200 (2022)
 [i11]Nicolás E. Díaz Ferreyra, Melina C. Vidoni, Maritta Heisel, Riccardo Scandariato: [i11]Nicolás E. Díaz Ferreyra, Melina C. Vidoni, Maritta Heisel, Riccardo Scandariato:
 Cybersecurity Discussions in Stack Overflow: A Developer-Centred Analysis of Engagement and Self-Disclosure Behaviour. CoRR abs/2207.01529 (2022)
 [i10]Catherine Tony, Nicolás E. Díaz Ferreyra, Riccardo Scandariato: [i10]Catherine Tony, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
 GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences. CoRR abs/2211.13498 (2022)
- 2021
 [j17]Mazen Mohamad [j17]Mazen Mohamad , Jan-Philipp Steghöfer, Riccardo Scandariato: , Jan-Philipp Steghöfer, Riccardo Scandariato:
 Security assurance cases - state of the art of an emerging approach. Empir. Softw. Eng. 26(4): 70 (2021)
 [j16]Katja Tuma [j16]Katja Tuma , Christian Sandberg, Urban Thorsson, Mathias Widman , Christian Sandberg, Urban Thorsson, Mathias Widman , Thomas Herpel , Thomas Herpel , Riccardo Scandariato: , Riccardo Scandariato:
 Finding security threats that matter: Two industrial case studies. J. Syst. Softw. 179: 111003 (2021)
 [j15]Tomasz Kosinski, Riccardo Scandariato, Morten Fjeld: [j15]Tomasz Kosinski, Riccardo Scandariato, Morten Fjeld:
 SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems. EAI Endorsed Trans. Security Safety 8(27): e1 (2021)
 [c60]Ivan Pashchenko [c60]Ivan Pashchenko , Riccardo Scandariato, Antonino Sabetta, Fabio Massacci , Riccardo Scandariato, Antonino Sabetta, Fabio Massacci : :
 Secure Software Development in the Era of Fluid Multi-party Open Software and Services. ICSE (NIER) 2021: 91-95
 [c59]Mazen Mohamad [c59]Mazen Mohamad , Örjan Askerdal, Rodi Jolak , Örjan Askerdal, Rodi Jolak , Jan-Philipp Steghöfer, Riccardo Scandariato: , Jan-Philipp Steghöfer, Riccardo Scandariato:
 Asset-driven Security Assurance Cases with Built-in Quality Assurance. EnCyCriS@ICSE 2021: 29-36
 [i9]Ivan Pashchenko, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci: [i9]Ivan Pashchenko, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci:
 Secure Software Development in the Era of Fluid Multi-party Open Software and Services. CoRR abs/2103.03331 (2021)
 [i8]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens: [i8]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
 Checking Security Compliance between Models and Code. CoRR abs/2108.08579 (2021)
- 2020
 [c58]Mazen Mohamad [c58]Mazen Mohamad , Alexander Åström , Alexander Åström , Örjan Askerdal, Jörgen Borg, Riccardo Scandariato: , Örjan Askerdal, Jörgen Borg, Riccardo Scandariato:
 Security assurance cases for road vehicles: an industry perspective. ARES 2020: 29:1-29:6
 [c57]Shamal Faily [c57]Shamal Faily , Riccardo Scandariato, Adam Shostack, Laurens Sion , Riccardo Scandariato, Adam Shostack, Laurens Sion , Duncan Ki-Aries , Duncan Ki-Aries : :
 Contextualisation of Data Flow Diagrams for Security Analysis. GraMSec@CSF 2020: 186-197
 [c56]Marvin Wyrich, Regina Hebig, Stefan Wagner [c56]Marvin Wyrich, Regina Hebig, Stefan Wagner , Riccardo Scandariato: , Riccardo Scandariato:
 Perception and Acceptance of an Autonomous Refactoring Bot. ICAART (1) 2020: 303-310
 [c55]Katja Tuma [c55]Katja Tuma , Laurens Sion , Laurens Sion , Riccardo Scandariato, Koen Yskout , Riccardo Scandariato, Koen Yskout : :
 Automating the early detection of security design flaws. MoDELS 2020: 332-342
 [c54]Sven Peldszus [c54]Sven Peldszus , Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato: , Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
 Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings. SE 2020: 51-52
 [c53]Stefan Carl Peiser, Ludwig Friborg, Riccardo Scandariato: [c53]Stefan Carl Peiser, Ludwig Friborg, Riccardo Scandariato:
 JavaScript Malware Detection Using Locality Sensitive Hashing. SEC 2020: 143-154
 [c52]Thomas Rosenstatter [c52]Thomas Rosenstatter , Kim Strandberg, Rodi Jolak , Kim Strandberg, Rodi Jolak , Riccardo Scandariato, Tomas Olovsson: , Riccardo Scandariato, Tomas Olovsson:
 REMIND: A Framework for the Resilient Design of Automotive Systems. SecDev 2020: 81-95
 [i7]Marvin Wyrich, Regina Hebig, Stefan Wagner, Riccardo Scandariato: [i7]Marvin Wyrich, Regina Hebig, Stefan Wagner, Riccardo Scandariato:
 Perception and Acceptance of an Autonomous Refactoring Bot. CoRR abs/2001.02553 (2020)
 [i6]Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato: [i6]Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato:
 Security Assurance Cases for Road Vehicles: an Industry Perspective. CoRR abs/2003.14106 (2020)
 [i5]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato: [i5]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato:
 Cross-project Classification of Security-related Requirements. CoRR abs/2003.14134 (2020)
 [i4]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato: [i4]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato:
 Security Assurance Cases - State of the Art of an Emerging Approach. CoRR abs/2003.14151 (2020)
 [i3]Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries: [i3]Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries:
 Contextualisation of Data Flow Diagrams for security analysis. CoRR abs/2006.04098 (2020)
2010 – 2019
- 2019
 [c51]Katja Tuma [c51]Katja Tuma , Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato: , Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato:
 Inspection guidelines to identify security design flaws. ECSA (Companion) 2019: 116-122
 [c50]Katja Tuma [c50]Katja Tuma , Riccardo Scandariato, Musard Balliu: , Riccardo Scandariato, Musard Balliu:
 Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis. ICSA 2019: 191-200
 [c49]Linda Erlenhov [c49]Linda Erlenhov , Francisco Gomes de Oliveira Neto , Francisco Gomes de Oliveira Neto , Riccardo Scandariato, Philipp Leitner , Riccardo Scandariato, Philipp Leitner : :
 Current and future bots in software development. BotSE@ICSE 2019: 7-11
 [c48]Laurens Sion [c48]Laurens Sion , Katja Tuma , Katja Tuma , Riccardo Scandariato, Koen Yskout , Riccardo Scandariato, Koen Yskout , Wouter Joosen: , Wouter Joosen:
 Towards Automated Security Design Flaw Detection. ASE Workshops 2019: 49-56
 [c47]Sven Peldszus [c47]Sven Peldszus , Katja Tuma , Katja Tuma , Daniel Strüber, Jan Jürjens, Riccardo Scandariato: , Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
 Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings. MoDELS 2019: 23-33
 [e5]Laurence Duchien, Anne Koziolek, Raffaela Mirandola, Elena Maria Navarro Martínez, Clément Quinton, Riccardo Scandariato, Patrizia Scandurra, Catia Trubiani, Danny Weyns: [e5]Laurence Duchien, Anne Koziolek, Raffaela Mirandola, Elena Maria Navarro Martínez, Clément Quinton, Riccardo Scandariato, Patrizia Scandurra, Catia Trubiani, Danny Weyns:
 Proceedings of the 13th European Conference on Software Architecture, ECSA 2019, Paris, France, September 9-13, 2019, Companion Proceedings (Proceedings Volume 2),. ACM 2019, ISBN 978-1-4503-7142-1 [contents]
 [i2]Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato: [i2]Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato:
 Inspection Guidelines to Identify Security Design Flaws. CoRR abs/1906.01961 (2019)
 [i1]Katja Tuma, Christian Sandberg, Urban Thorsson, Mathias Widman, Riccardo Scandariato: [i1]Katja Tuma, Christian Sandberg, Urban Thorsson, Mathias Widman, Riccardo Scandariato:
 Finding Security Threats That Matter: An Industrial Case Study. CoRR abs/1910.03422 (2019)
- 2018
 [j14]Katja Tuma [j14]Katja Tuma , Gül Çalikli , Gül Çalikli , Riccardo Scandariato: , Riccardo Scandariato:
 Threat analysis of software systems: A systematic literature review. J. Syst. Softw. 144: 275-294 (2018)
 [c46]Katja Tuma [c46]Katja Tuma , Riccardo Scandariato: , Riccardo Scandariato:
 Two Architectural Threat Analysis Techniques Compared. ECSA 2018: 347-363
 [c45]Thibaud Antignac, Riccardo Scandariato, Gerardo Schneider: [c45]Thibaud Antignac, Riccardo Scandariato, Gerardo Schneider:
 Privacy Compliance Via Model Transformations. EuroS&P Workshops 2018: 120-126
 [c44]Stefanie Jasser [c44]Stefanie Jasser , Katja Tuma , Katja Tuma , Riccardo Scandariato, Matthias Riebisch: , Riccardo Scandariato, Matthias Riebisch:
 Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process. ICISSP 2018: 438-446
 [c43]Riccardo Scandariato, Jennifer Horkoff, Robert Feldt: [c43]Riccardo Scandariato, Jennifer Horkoff, Robert Feldt:
 Generative secure design, defined. ICSE (NIER) 2018: 1-4
 [c42]Alexander van Den Berghe, Koen Yskout [c42]Alexander van Den Berghe, Koen Yskout , Riccardo Scandariato, Wouter Joosen: , Riccardo Scandariato, Wouter Joosen:
 A Lingua Franca for Security by Design. SecDev 2018: 69-76
- 2017
 [j13]Alexander van Den Berghe, Riccardo Scandariato, Koen Yskout [j13]Alexander van Den Berghe, Riccardo Scandariato, Koen Yskout , Wouter Joosen: , Wouter Joosen:
 Design notations for secure software: a systematic literature review. Softw. Syst. Model. 16(3): 809-831 (2017)
 [j12]Jeffrey Stuckman, James Walden [j12]Jeffrey Stuckman, James Walden , Riccardo Scandariato: , Riccardo Scandariato:
 The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models. IEEE Trans. Reliab. 66(1): 17-37 (2017)
 [c41]Vasileios Theodorou [c41]Vasileios Theodorou , Ilias Gerostathopoulos , Ilias Gerostathopoulos , Sasan Amini, Riccardo Scandariato, Christian Prehofer, Miroslaw Staron , Sasan Amini, Riccardo Scandariato, Christian Prehofer, Miroslaw Staron : :
 Theta Architecture: Preserving the Quality of Analytics in Data-Driven Systems. ADBIS (Short Papers and Workshops) 2017: 186-198
 [c40]Katja Tuma [c40]Katja Tuma , Riccardo Scandariato, Mathias Widman, Christian Sandberg: , Riccardo Scandariato, Mathias Widman, Christian Sandberg:
 Towards Security Threats that Matter. CyberICPS/SECPRE@ESORICS 2017: 47-62
 [c39]Bashar Nassar, Riccardo Scandariato: [c39]Bashar Nassar, Riccardo Scandariato:
 Traceability Metrics as Early Predictors of Software Defects? ICSA 2017: 235-238
 [c38]Alexander van Den Berghe, Koen Yskout [c38]Alexander van Den Berghe, Koen Yskout , Riccardo Scandariato, Wouter Joosen: , Riccardo Scandariato, Wouter Joosen:
 A Model for Provably Secure Software Design. FormaliSE@ICSE 2017: 3-9
 [c37]Laurens Sion [c37]Laurens Sion , Koen Yskout , Koen Yskout , Riccardo Scandariato, Wouter Joosen: , Riccardo Scandariato, Wouter Joosen:
 A Modular Meta-model for Security Solutions. Programming 2017: 16:1-16:5
- 2016
 [c36]Mariano Ceccato [c36]Mariano Ceccato , Riccardo Scandariato: , Riccardo Scandariato:
 Static Analysis and Penetration Testing from the Perspective of Maintenance Teams. ESEM 2016: 25:1-25:6
 [c35]Aram Hovsepyan, Riccardo Scandariato, Wouter Joosen: [c35]Aram Hovsepyan, Riccardo Scandariato, Wouter Joosen:
 Is Newer Always Better?: The Case of Vulnerability Prediction Models. ESEM 2016: 26:1-26:6
 [c34]Thibaud Antignac, Riccardo Scandariato, Gerardo Schneider: [c34]Thibaud Antignac, Riccardo Scandariato, Gerardo Schneider:
 A Privacy-Aware Conceptual Model for Handling Personal Data. ISoLA (1) 2016: 942-957
 [c33]Miroslaw Staron [c33]Miroslaw Staron , Riccardo Scandariato: , Riccardo Scandariato:
 Data veracity in intelligent transportation systems: The slippery road warning scenario. Intelligent Vehicles Symposium 2016: 821-826
 [c32]Bashar Nassar, Ali Shahrokni, Riccardo Scandariato: [c32]Bashar Nassar, Ali Shahrokni, Riccardo Scandariato:
 Traceability Data in Early Development Phases as an Enabler for Decision Support. XP Workshops 2016: 15
- 2015
 [j11]Riccardo Scandariato, Kim Wuyts [j11]Riccardo Scandariato, Kim Wuyts , Wouter Joosen: , Wouter Joosen:
 A descriptive study of Microsoft's threat modeling technique. Requir. Eng. 20(2): 163-180 (2015)
 [c31]Laurens Sion [c31]Laurens Sion , Koen Yskout , Koen Yskout , Alexander van Den Berghe, Riccardo Scandariato, Wouter Joosen: , Alexander van Den Berghe, Riccardo Scandariato, Wouter Joosen:
 MASC: Modelling Architectural Security Concerns. MiSE@ICSE 2015: 36-41
 [c30]Koen Yskout [c30]Koen Yskout , Riccardo Scandariato, Wouter Joosen: , Riccardo Scandariato, Wouter Joosen:
 Do Security Patterns Really Help Designers? ICSE (1) 2015: 292-302
 [c29]Phu Hong Nguyen [c29]Phu Hong Nguyen , Koen Yskout , Koen Yskout , Thomas Heyman, Jacques Klein , Thomas Heyman, Jacques Klein , Riccardo Scandariato, Yves Le Traon , Riccardo Scandariato, Yves Le Traon : :
 SoSPa: A system of Security design Patterns for systematically engineering secure systems. MoDELS 2015: 246-255
- 2014
 [j10]Aram Hovsepyan, Riccardo Scandariato, Maximilian Steff, Wouter Joosen: [j10]Aram Hovsepyan, Riccardo Scandariato, Maximilian Steff, Wouter Joosen:
 Design Churn as Predictor of Vulnerabilities? Int. J. Secur. Softw. Eng. 5(3): 16-31 (2014)
 [j9]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout [j9]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout , Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu: , Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
 Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014)
 [j8]Kim Wuyts [j8]Kim Wuyts , Riccardo Scandariato, Wouter Joosen: , Riccardo Scandariato, Wouter Joosen:
 Empirical evaluation of a privacy-focused threat modeling methodology. J. Syst. Softw. 96: 122-138 (2014)
 [j7]Koen Yskout [j7]Koen Yskout , Riccardo Scandariato, Wouter Joosen: , Riccardo Scandariato, Wouter Joosen:
 Change patterns - Co-evolving requirements and architecture. Softw. Syst. Model. 13(2): 625-648 (2014)
 [j6]Riccardo Scandariato, James Walden [j6]Riccardo Scandariato, James Walden , Aram Hovsepyan, Wouter Joosen: , Aram Hovsepyan, Wouter Joosen:
 Predicting Vulnerable Software Components via Text Mining. IEEE Trans. Software Eng. 40(10): 993-1006 (2014)
 [c28]James Walden [c28]James Walden , Jeff Stuckman, Riccardo Scandariato: , Jeff Stuckman, Riccardo Scandariato:
 Predicting Vulnerable Components: Software Metrics vs Text Mining. ISSRE 2014: 23-33
 [p1]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout [p1]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout , Fabio Massacci , Fabio Massacci , Wouter Joosen: , Wouter Joosen:
 Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Engineering Secure Future Internet Services and Systems 2014: 35-64
- 2013
 [j5]Koen Buyens, Riccardo Scandariato, Wouter Joosen: [j5]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
 Least privilege analysis in software architectures. Softw. Syst. Model. 12(2): 331-348 (2013)
 [c27]Riccardo Scandariato, James Walden [c27]Riccardo Scandariato, James Walden , Wouter Joosen: , Wouter Joosen:
 Static analysis versus penetration testing: A controlled experiment. ISSRE 2013: 451-460
 [e4]Jan Jürjens, Benjamin Livshits, Riccardo Scandariato: [e4]Jan Jürjens, Benjamin Livshits, Riccardo Scandariato:
 Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings. Lecture Notes in Computer Science 7781, Springer 2013, ISBN 978-3-642-36562-1 [contents]
- 2012
 [j4]Bernard Spitz, Riccardo Scandariato, Wouter Joosen: [j4]Bernard Spitz, Riccardo Scandariato, Wouter Joosen:
 Extraction of an Architectural Model for Least Privilege Analysis. Int. J. Secur. Softw. Eng. 3(4): 27-44 (2012)
 [c26]Koen Yskout [c26]Koen Yskout , Riccardo Scandariato, Wouter Joosen: , Riccardo Scandariato, Wouter Joosen:
 Does organizing security patterns focus architectural choices? ICSE 2012: 617-627
 [c25]Thomas Heyman, Riccardo Scandariato, Wouter Joosen: [c25]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
 Reusable Formal Models for Secure Software Architectures. WICSA/ECSA 2012: 41-50
 [e3]Gilles Barthe [e3]Gilles Barthe , Benjamin Livshits, Riccardo Scandariato: , Benjamin Livshits, Riccardo Scandariato:
 Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings. Lecture Notes in Computer Science 7159, Springer 2012, ISBN 978-3-642-28165-5 [contents]
 [e2]Alessandro Moschitti, Riccardo Scandariato: [e2]Alessandro Moschitti, Riccardo Scandariato:
 Eternal Systems - First International Workshop, EternalS@FET 2011, Budapest, Hungary, May 3, 2011, Revised Selected Papers. Communications in Computer and Information Science 255, Springer 2012, ISBN 978-3-642-28032-0 [contents]
- 2011
 [j3]Kim Wuyts, Riccardo Scandariato, Griet Verhenneman, Wouter Joosen: [j3]Kim Wuyts, Riccardo Scandariato, Griet Verhenneman, Wouter Joosen:
 Integrating Patient Consent in e-Health Access Control. Int. J. Secur. Softw. Eng. 2(2): 1-24 (2011)
 [j2]Mina Deng, Kim Wuyts [j2]Mina Deng, Kim Wuyts , Riccardo Scandariato, Bart Preneel , Riccardo Scandariato, Bart Preneel , Wouter Joosen: , Wouter Joosen:
 A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1): 3-32 (2011)
 [c24]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Wouter Joosen, Serge Demeyer [c24]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Wouter Joosen, Serge Demeyer : :
 Preserving Aspects via Automation: A Maintainability Study. ESEM 2011: 315-324
 [c23]Thomas Heyman, Koen Yskout [c23]Thomas Heyman, Koen Yskout , Riccardo Scandariato, Holger Schmidt, Yijun Yu , Riccardo Scandariato, Holger Schmidt, Yijun Yu : :
 The Security Twin Peaks. ESSoS 2011: 167-180
 [c22]Koen Yskout [c22]Koen Yskout , Olivier-Nathanael Ben David, Riccardo Scandariato, Benoit Baudry: , Olivier-Nathanael Ben David, Riccardo Scandariato, Benoit Baudry:
 Requirements-Driven Runtime Reconfiguration for Security. EternalS@FET 2011: 25-33
 [c21]Koen Buyens, Riccardo Scandariato, Wouter Joosen: [c21]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
 Composition of least privilege analysis results in software architectures (position paper). SESS@ICSE 2011: 29-35
- 2010
 [c20]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Yolande Berbers, Wouter Joosen: [c20]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
 From aspect-oriented models to aspect-oriented code?: the maintenance perspective. AOSD 2010: 85-96
 [c19]Thomas Heyman, Riccardo Scandariato, Wouter Joosen: [c19]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
 Security in Context: Analysis and Refinement of Software Architectures. COMPSAC 2010: 161-170
 [c18]Riccardo Scandariato, Koen Buyens, Wouter Joosen: [c18]Riccardo Scandariato, Koen Buyens, Wouter Joosen:
 Automated Detection of Least Privilege Violations in Software Architectures. ECSA 2010: 150-165
 [c17]Riccardo Scandariato, Fabio Massacci [c17]Riccardo Scandariato, Fabio Massacci : :
 SecureChange: Security Engineering for Lifelong Evolvable Systems. ISoLA (2) 2010: 9-12
2000 – 2009
- 2009
 [j1]Bart De Win, Riccardo Scandariato, Koen Buyens, Johan Grégoire, Wouter Joosen: [j1]Bart De Win, Riccardo Scandariato, Koen Buyens, Johan Grégoire, Wouter Joosen:
 On the secure software development process: CLASP, SDL and Touchpoints compared. Inf. Softw. Technol. 51(7): 1152-1171 (2009)
 [c16]Thomas Heyman, Riccardo Scandariato, Wouter Joosen: [c16]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
 Risk-Driven Architectural Decomposition. ARES 2009: 363-368
 [c15]Kim Wuyts [c15]Kim Wuyts , Riccardo Scandariato, Bart De Decker, Wouter Joosen: , Riccardo Scandariato, Bart De Decker, Wouter Joosen:
 Linking Privacy Solutions to Developer Goals. ARES 2009: 847-852
 [c14]Koen Buyens, Riccardo Scandariato, Wouter Joosen: [c14]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
 Measuring the interplay of security principles in software architectures. ESEM 2009: 554-563
- 2008
 [c13]Kim Wuyts [c13]Kim Wuyts , Riccardo Scandariato, Geert Claeys, Wouter Joosen: , Riccardo Scandariato, Geert Claeys, Wouter Joosen:
 Hardening XDS-Based Architectures. ARES 2008: 18-25
 [c12]Riccardo Scandariato, Yoram Ofek, Paolo Falcarin [c12]Riccardo Scandariato, Yoram Ofek, Paolo Falcarin , Mario Baldi: , Mario Baldi:
 Application-Oriented Trust in Distributed Computing. ARES 2008: 434-439
 [c11]Thomas Heyman, Riccardo Scandariato, Christophe Huygens [c11]Thomas Heyman, Riccardo Scandariato, Christophe Huygens , Wouter Joosen: , Wouter Joosen:
 Using Security Patterns to Combine Security Metrics. ARES 2008: 1156-1163
 [c10]Koen Yskout [c10]Koen Yskout , Riccardo Scandariato, Bart De Win, Wouter Joosen: , Riccardo Scandariato, Bart De Win, Wouter Joosen:
 Transforming Security Requirements into Architecture. ARES 2008: 1421-1428
 [c9]Eryk Kylikowski, Riccardo Scandariato, Wouter Joosen: [c9]Eryk Kylikowski, Riccardo Scandariato, Wouter Joosen:
 Using Multi-Level Security Annotations to Improve Software Assurance. HASE 2008: 471-474
 [c8]Mina Deng, Riccardo Scandariato, Danny De Cock, Bart Preneel [c8]Mina Deng, Riccardo Scandariato, Danny De Cock, Bart Preneel , Wouter Joosen: , Wouter Joosen:
 Identity in federated electronic healthcare. Wireless Days 2008: 1-5
 [e1]Riccardo Scandariato, Giovanni Russello: [e1]Riccardo Scandariato, Giovanni Russello:
 Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008. ACM 2008, ISBN 978-1-60558-363-1 [contents]
- 2007
 [c7]Koen Buyens, Riccardo Scandariato, Wouter Joosen: [c7]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
 Process Activities Supporting Security Principles. COMPSAC (2) 2007: 281-292
 [c6]Johan Grégoire, Koen Buyens, Bart De Win, Riccardo Scandariato, Wouter Joosen: [c6]Johan Grégoire, Koen Buyens, Bart De Win, Riccardo Scandariato, Wouter Joosen:
 On the Secure Software Development Process: CLASP and SDL Compared. SESS@ICSE 2007: 1
 [c5]Thomas Heyman, Koen Yskout [c5]Thomas Heyman, Koen Yskout , Riccardo Scandariato, Wouter Joosen: , Riccardo Scandariato, Wouter Joosen:
 An Analysis of the Security Patterns Landscape. SESS@ICSE 2007: 3
- 2006
 [c4]Paolo Falcarin [c4]Paolo Falcarin , Riccardo Scandariato, Mario Baldi: , Riccardo Scandariato, Mario Baldi:
 Remote Trust with Aspect-Oriented Programming. AINA (1) 2006: 451-458
 [c3]Riccardo Scandariato, Bart De Win, Wouter Joosen: [c3]Riccardo Scandariato, Bart De Win, Wouter Joosen:
 Towards a measuring framework for security properties of software. QoP 2006: 27-30
- 2004
 [b1]Riccardo Scandariato: [b1]Riccardo Scandariato:
 Plicy-based solutions for distributed systems. Polytechnic University of Turin, Italy, 2004
 [c2]Riccardo Scandariato, John C. Knight: [c2]Riccardo Scandariato, John C. Knight:
 The Design and Evaluation of a Defense System for Internet Worms. SRDS 2004: 164-173
- 2002
 [c1]Riccardo Scandariato, Fulvio Risso [c1]Riccardo Scandariato, Fulvio Risso , Patricia Lago: , Patricia Lago:
 LMAP: a protocol to automate the setup of logical networks. ICON 2002: 461-466
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-16 00:09 CEST by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID






