


Остановите войну!
for scientists:


default search action
Riccardo Scandariato
Person information

- affiliation: Hamburg University of Technology, Germany
- affiliation: University of Gothenburg, Sweden
- affiliation: Chalmers University of Technology, Sweden
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j22]Simon Schneider
, Riccardo Scandariato:
Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java. J. Syst. Softw. 202: 111722 (2023) - [j21]Katja Tuma, Sven Peldszus
, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking security compliance between models and code. Softw. Syst. Model. 22(1): 273-296 (2023) - [j20]Mazen Mohamad
, Rodi Jolak
, Örjan Askerdal
, Jan-Philipp Steghöfer
, Riccardo Scandariato
:
CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems. ACM Trans. Cyber Phys. Syst. 7(1): 3:1-3:26 (2023) - [j19]Uwe Zdun
, Pierre-Jean Queval
, Georg Simhandl
, Riccardo Scandariato
, Somik Chakravarty
, Marjan Jelic
, Aleksandar S. Jovanovic
:
Microservice Security Metrics for Secure Communication, Identity Management, and Observability. ACM Trans. Softw. Eng. Methodol. 32(1): 16:1-16:34 (2023) - [c74]Nicolás Emilio Díaz Ferreyra
, Gautam Kishore Shahi
, Catherine Tony
, Stefan Stieglitz
, Riccardo Scandariato
:
Regret, Delete, (Do Not) Repeat: An Analysis of Self-Cleaning Practices on Twitter After the Outbreak of the COVID-19 Pandemic. CHI Extended Abstracts 2023: 246:1-246:7 - [c73]Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina C. Vidoni, Riccardo Scandariato:
Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms. CHASE 2023: 105-110 - [c72]Simon Schneider, Tufan Özen, Michael Chen, Riccardo Scandariato:
microSecEnD: A Dataset of Security-Enriched Dataflow Diagrams for Microservice Applications. MSR 2023: 125-129 - [c71]Catherine Tony, Markus Mutas, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
LLMSecEval: A Dataset of Natural Language Prompts for Security Evaluations. MSR 2023: 588-592 - [i17]Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina C. Vidoni, Riccardo Scandariato:
Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms. CoRR abs/2303.01822 (2023) - [i16]Nicolás E. Díaz Ferreyra, Gautam Kishore Shahi, Catherine Tony, Stefan Stieglitz, Riccardo Scandariato:
Regret, Delete, (Do Not) Repeat: An Analysis of Self-Cleaning Practices on Twitter After the Outbreak of the COVID-19 Pandemic. CoRR abs/2303.09135 (2023) - [i15]Catherine Tony, Markus Mutas, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
LLMSecEval: A Dataset of Natural Language Prompts for Security Evaluations. CoRR abs/2303.09384 (2023) - [i14]Simon Schneider, Riccardo Scandariato:
Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice Applications written in Java. CoRR abs/2304.12769 (2023) - 2022
- [j18]Rodi Jolak
, Thomas Rosenstatter
, Mazen Mohamad
, Kim Strandberg
, Behrooz Sangchoolie
, Nasser Nowdehi
, Riccardo Scandariato:
CONSERVE: A framework for the selection of techniques for monitoring containers security. J. Syst. Softw. 186: 111158 (2022) - [c70]Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra
, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl:
SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices. ARES 2022: 9:1-9:10 - [c69]Hanaa Alshareef, Katja Tuma, Sandro Stucki, Gerardo Schneider, Riccardo Scandariato:
Precise Analysis of Purpose Limitation in Data Flow Diagrams. ARES 2022: 17:1-17:11 - [c68]Kamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra
, Julian Koch
, Thorsten Schüppstuhl
, Riccardo Scandariato:
STRIPED: A Threat Analysis Method for IoT Systems. ARES 2022: 96:1-96:6 - [c67]Anusha Bambhore Tukaram, Simon Schneider, Nicolás E. Díaz Ferreyra
, Georg Simhandl, Uwe Zdun, Riccardo Scandariato:
Towards a Security Benchmark for the Architectural Design of Microservice Applications. ARES 2022: 116:1-116:7 - [c66]Catherine Tony
, Mohana Balasubramanian, Nicolás E. Díaz Ferreyra
, Riccardo Scandariato:
Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot. EASE 2022: 276-281 - [c65]Rodi Jolak, Thomas Rosenstatter, Saif Aldaghistani, Riccardo Scandariato:
RIPOSTE: A Collaborative Cyber Attack Response Framework for Automotive Systems. SEAA 2022: 350-357 - [c64]Eduard Pinconschi, Quang-Cuong Bui, Rui Abreu, Pedro Adão, Riccardo Scandariato:
Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities. ISSTA 2022: 789-792 - [c63]Quang-Cuong Bui, Riccardo Scandariato, Nicolás E. Díaz Ferreyra
:
Vul4J: A Dataset of Reproducible Java Vulnerabilities Geared Towards the Study of Program Repair Techniques. MSR 2022: 464-468 - [c62]Mazen Mohamad, Jan-Philipp Steghöfer, Alexander Åström, Riccardo Scandariato:
Identifying security-related requirements in regulatory documents based on cross-project classification. PROMISE 2022: 82-91 - [c61]Catherine Tony
, Nicolás E. Díaz Ferreyra
, Riccardo Scandariato:
GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences. QRS 2022: 896-906 - [i13]Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl:
Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices. CoRR abs/2202.01612 (2022) - [i12]Catherine Tony, Mohana Balasubramanian, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot. CoRR abs/2205.06200 (2022) - [i11]Nicolás E. Díaz Ferreyra, Melina C. Vidoni, Maritta Heisel, Riccardo Scandariato:
Cybersecurity Discussions in Stack Overflow: A Developer-Centred Analysis of Engagement and Self-Disclosure Behaviour. CoRR abs/2207.01529 (2022) - [i10]Catherine Tony, Nicolás E. Díaz Ferreyra, Riccardo Scandariato:
GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences. CoRR abs/2211.13498 (2022) - 2021
- [j17]Mazen Mohamad
, Jan-Philipp Steghöfer, Riccardo Scandariato:
Security assurance cases - state of the art of an emerging approach. Empir. Softw. Eng. 26(4): 70 (2021) - [j16]Katja Tuma
, Christian Sandberg, Urban Thorsson, Mathias Widman
, Thomas Herpel
, Riccardo Scandariato:
Finding security threats that matter: Two industrial case studies. J. Syst. Softw. 179: 111003 (2021) - [j15]Tomasz Kosinski, Riccardo Scandariato, Morten Fjeld:
SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems. EAI Endorsed Trans. Security Safety 8(27): e1 (2021) - [c60]Ivan Pashchenko
, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci:
Secure Software Development in the Era of Fluid Multi-party Open Software and Services. ICSE (NIER) 2021: 91-95 - [c59]Mazen Mohamad, Örjan Askerdal, Rodi Jolak, Jan-Philipp Steghöfer, Riccardo Scandariato:
Asset-driven Security Assurance Cases with Built-in Quality Assurance. EnCyCriS@ICSE 2021: 29-36 - [i9]Ivan Pashchenko, Riccardo Scandariato, Antonino Sabetta, Fabio Massacci:
Secure Software Development in the Era of Fluid Multi-party Open Software and Services. CoRR abs/2103.03331 (2021) - [i8]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking Security Compliance between Models and Code. CoRR abs/2108.08579 (2021) - 2020
- [c58]Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato:
Security assurance cases for road vehicles: an industry perspective. ARES 2020: 29:1-29:6 - [c57]Shamal Faily
, Riccardo Scandariato, Adam Shostack, Laurens Sion
, Duncan Ki-Aries
:
Contextualisation of Data Flow Diagrams for Security Analysis. GraMSec@CSF 2020: 186-197 - [c56]Marvin Wyrich, Regina Hebig, Stefan Wagner
, Riccardo Scandariato:
Perception and Acceptance of an Autonomous Refactoring Bot. ICAART (1) 2020: 303-310 - [c55]Katja Tuma
, Laurens Sion, Riccardo Scandariato, Koen Yskout
:
Automating the early detection of security design flaws. MoDELS 2020: 332-342 - [c54]Sven Peldszus, Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings. SE 2020: 51-52 - [c53]Stefan Carl Peiser, Ludwig Friborg, Riccardo Scandariato:
JavaScript Malware Detection Using Locality Sensitive Hashing. SEC 2020: 143-154 - [c52]Thomas Rosenstatter
, Kim Strandberg, Rodi Jolak, Riccardo Scandariato, Tomas Olovsson:
REMIND: A Framework for the Resilient Design of Automotive Systems. SecDev 2020: 81-95 - [i7]Marvin Wyrich, Regina Hebig, Stefan Wagner, Riccardo Scandariato:
Perception and Acceptance of an Autonomous Refactoring Bot. CoRR abs/2001.02553 (2020) - [i6]Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato:
Security Assurance Cases for Road Vehicles: an Industry Perspective. CoRR abs/2003.14106 (2020) - [i5]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato:
Cross-project Classification of Security-related Requirements. CoRR abs/2003.14134 (2020) - [i4]Mazen Mohamad, Jan-Philipp Steghöfer, Riccardo Scandariato:
Security Assurance Cases - State of the Art of an Emerging Approach. CoRR abs/2003.14151 (2020) - [i3]Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries:
Contextualisation of Data Flow Diagrams for security analysis. CoRR abs/2006.04098 (2020)
2010 – 2019
- 2019
- [c51]Katja Tuma
, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato:
Inspection guidelines to identify security design flaws. ECSA (Companion) 2019: 116-122 - [c50]Katja Tuma
, Riccardo Scandariato, Musard Balliu:
Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis. ICSA 2019: 191-200 - [c49]Linda Erlenhov
, Francisco Gomes de Oliveira Neto
, Riccardo Scandariato, Philipp Leitner:
Current and future bots in software development. BotSE@ICSE 2019: 7-11 - [c48]Laurens Sion
, Katja Tuma
, Riccardo Scandariato, Koen Yskout
, Wouter Joosen:
Towards Automated Security Design Flaw Detection. ASE Workshops 2019: 49-56 - [c47]Sven Peldszus
, Katja Tuma
, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings. MoDELS 2019: 23-33 - [e5]Laurence Duchien, Anne Koziolek, Raffaela Mirandola, Elena Maria Navarro Martínez, Clément Quinton, Riccardo Scandariato, Patrizia Scandurra, Catia Trubiani, Danny Weyns:
Proceedings of the 13th European Conference on Software Architecture, ECSA 2019, Paris, France, September 9-13, 2019, Companion Proceedings (Proceedings Volume 2),. ACM 2019, ISBN 978-1-4503-7142-1 [contents] - [i2]Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato:
Inspection Guidelines to Identify Security Design Flaws. CoRR abs/1906.01961 (2019) - [i1]Katja Tuma, Christian Sandberg, Urban Thorsson, Mathias Widman, Riccardo Scandariato:
Finding Security Threats That Matter: An Industrial Case Study. CoRR abs/1910.03422 (2019) - 2018
- [j14]Katja Tuma
, Gül Çalikli
, Riccardo Scandariato:
Threat analysis of software systems: A systematic literature review. J. Syst. Softw. 144: 275-294 (2018) - [c46]Katja Tuma
, Riccardo Scandariato:
Two Architectural Threat Analysis Techniques Compared. ECSA 2018: 347-363 - [c45]Thibaud Antignac, Riccardo Scandariato, Gerardo Schneider:
Privacy Compliance Via Model Transformations. EuroS&P Workshops 2018: 120-126 - [c44]Stefanie Jasser
, Katja Tuma
, Riccardo Scandariato, Matthias Riebisch:
Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process. ICISSP 2018: 438-446 - [c43]Riccardo Scandariato, Jennifer Horkoff, Robert Feldt:
Generative secure design, defined. ICSE (NIER) 2018: 1-4 - [c42]Alexander van Den Berghe, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
A Lingua Franca for Security by Design. SecDev 2018: 69-76 - 2017
- [j13]Alexander van Den Berghe, Riccardo Scandariato, Koen Yskout
, Wouter Joosen:
Design notations for secure software: a systematic literature review. Softw. Syst. Model. 16(3): 809-831 (2017) - [j12]Jeffrey Stuckman, James Walden, Riccardo Scandariato:
The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models. IEEE Trans. Reliab. 66(1): 17-37 (2017) - [c41]Vasileios Theodorou
, Ilias Gerostathopoulos
, Sasan Amini, Riccardo Scandariato, Christian Prehofer, Miroslaw Staron:
Theta Architecture: Preserving the Quality of Analytics in Data-Driven Systems. ADBIS (Short Papers and Workshops) 2017: 186-198 - [c40]Katja Tuma
, Riccardo Scandariato, Mathias Widman, Christian Sandberg:
Towards Security Threats that Matter. CyberICPS/SECPRE@ESORICS 2017: 47-62 - [c39]Bashar Nassar, Riccardo Scandariato:
Traceability Metrics as Early Predictors of Software Defects? ICSA 2017: 235-238 - [c38]Alexander van Den Berghe, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
A Model for Provably Secure Software Design. FormaliSE@ICSE 2017: 3-9 - [c37]Laurens Sion
, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
A Modular Meta-model for Security Solutions. Programming 2017: 16:1-16:5 - 2016
- [c36]Mariano Ceccato
, Riccardo Scandariato:
Static Analysis and Penetration Testing from the Perspective of Maintenance Teams. ESEM 2016: 25:1-25:6 - [c35]Aram Hovsepyan, Riccardo Scandariato, Wouter Joosen:
Is Newer Always Better?: The Case of Vulnerability Prediction Models. ESEM 2016: 26:1-26:6 - [c34]Thibaud Antignac, Riccardo Scandariato, Gerardo Schneider:
A Privacy-Aware Conceptual Model for Handling Personal Data. ISoLA (1) 2016: 942-957 - [c33]Miroslaw Staron, Riccardo Scandariato:
Data veracity in intelligent transportation systems: The slippery road warning scenario. Intelligent Vehicles Symposium 2016: 821-826 - [c32]Bashar Nassar, Ali Shahrokni, Riccardo Scandariato:
Traceability Data in Early Development Phases as an Enabler for Decision Support. XP Workshops 2016: 15 - 2015
- [j11]Riccardo Scandariato, Kim Wuyts
, Wouter Joosen:
A descriptive study of Microsoft's threat modeling technique. Requir. Eng. 20(2): 163-180 (2015) - [c31]Laurens Sion
, Koen Yskout
, Alexander van Den Berghe, Riccardo Scandariato, Wouter Joosen:
MASC: Modelling Architectural Security Concerns. MiSE@ICSE 2015: 36-41 - [c30]Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
Do Security Patterns Really Help Designers? ICSE (1) 2015: 292-302 - [c29]Phu Hong Nguyen
, Koen Yskout
, Thomas Heyman, Jacques Klein
, Riccardo Scandariato, Yves Le Traon
:
SoSPa: A system of Security design Patterns for systematically engineering secure systems. MoDELS 2015: 246-255 - 2014
- [j10]Aram Hovsepyan, Riccardo Scandariato, Maximilian Steff, Wouter Joosen:
Design Churn as Predictor of Vulnerabilities? Int. J. Secur. Softw. Eng. 5(3): 16-31 (2014) - [j9]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout
, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [j8]Kim Wuyts
, Riccardo Scandariato, Wouter Joosen:
Empirical evaluation of a privacy-focused threat modeling methodology. J. Syst. Softw. 96: 122-138 (2014) - [j7]Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
Change patterns - Co-evolving requirements and architecture. Softw. Syst. Model. 13(2): 625-648 (2014) - [j6]Riccardo Scandariato, James Walden, Aram Hovsepyan, Wouter Joosen:
Predicting Vulnerable Software Components via Text Mining. IEEE Trans. Software Eng. 40(10): 993-1006 (2014) - [c28]James Walden, Jeff Stuckman, Riccardo Scandariato:
Predicting Vulnerable Components: Software Metrics vs Text Mining. ISSRE 2014: 23-33 - [p1]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout
, Fabio Massacci
, Wouter Joosen:
Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Engineering Secure Future Internet Services and Systems 2014: 35-64 - 2013
- [j5]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Least privilege analysis in software architectures. Softw. Syst. Model. 12(2): 331-348 (2013) - [c27]Riccardo Scandariato, James Walden, Wouter Joosen:
Static analysis versus penetration testing: A controlled experiment. ISSRE 2013: 451-460 - [e4]Jan Jürjens, Benjamin Livshits, Riccardo Scandariato:
Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings. Lecture Notes in Computer Science 7781, Springer 2013, ISBN 978-3-642-36562-1 [contents] - 2012
- [j4]Bernard Spitz, Riccardo Scandariato, Wouter Joosen:
Extraction of an Architectural Model for Least Privilege Analysis. Int. J. Secur. Softw. Eng. 3(4): 27-44 (2012) - [c26]Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
Does organizing security patterns focus architectural choices? ICSE 2012: 617-627 - [c25]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Reusable Formal Models for Secure Software Architectures. WICSA/ECSA 2012: 41-50 - [e3]Gilles Barthe
, Benjamin Livshits, Riccardo Scandariato:
Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings. Lecture Notes in Computer Science 7159, Springer 2012, ISBN 978-3-642-28165-5 [contents] - [e2]Alessandro Moschitti, Riccardo Scandariato:
Eternal Systems - First International Workshop, EternalS@FET 2011, Budapest, Hungary, May 3, 2011, Revised Selected Papers. Communications in Computer and Information Science 255, Springer 2012, ISBN 978-3-642-28032-0 [contents] - 2011
- [j3]Kim Wuyts, Riccardo Scandariato, Griet Verhenneman, Wouter Joosen:
Integrating Patient Consent in e-Health Access Control. Int. J. Secur. Softw. Eng. 2(2): 1-24 (2011) - [j2]Mina Deng, Kim Wuyts
, Riccardo Scandariato, Bart Preneel
, Wouter Joosen:
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16(1): 3-32 (2011) - [c24]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Wouter Joosen, Serge Demeyer
:
Preserving Aspects via Automation: A Maintainability Study. ESEM 2011: 315-324 - [c23]Thomas Heyman, Koen Yskout
, Riccardo Scandariato, Holger Schmidt, Yijun Yu
:
The Security Twin Peaks. ESSoS 2011: 167-180 - [c22]Koen Yskout
, Olivier-Nathanael Ben David, Riccardo Scandariato, Benoit Baudry:
Requirements-Driven Runtime Reconfiguration for Security. EternalS@FET 2011: 25-33 - [c21]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Composition of least privilege analysis results in software architectures (position paper). SESS@ICSE 2011: 29-35 - 2010
- [c20]Aram Hovsepyan, Riccardo Scandariato, Stefan Van Baelen, Yolande Berbers, Wouter Joosen:
From aspect-oriented models to aspect-oriented code?: the maintenance perspective. AOSD 2010: 85-96 - [c19]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Security in Context: Analysis and Refinement of Software Architectures. COMPSAC 2010: 161-170 - [c18]Riccardo Scandariato, Koen Buyens, Wouter Joosen:
Automated Detection of Least Privilege Violations in Software Architectures. ECSA 2010: 150-165 - [c17]Riccardo Scandariato, Fabio Massacci
:
SecureChange: Security Engineering for Lifelong Evolvable Systems. ISoLA (2) 2010: 9-12
2000 – 2009
- 2009
- [j1]Bart De Win, Riccardo Scandariato, Koen Buyens, Johan Grégoire, Wouter Joosen:
On the secure software development process: CLASP, SDL and Touchpoints compared. Inf. Softw. Technol. 51(7): 1152-1171 (2009) - [c16]Thomas Heyman, Riccardo Scandariato, Wouter Joosen:
Risk-Driven Architectural Decomposition. ARES 2009: 363-368 - [c15]Kim Wuyts
, Riccardo Scandariato, Bart De Decker, Wouter Joosen:
Linking Privacy Solutions to Developer Goals. ARES 2009: 847-852 - [c14]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Measuring the interplay of security principles in software architectures. ESEM 2009: 554-563 - 2008
- [c13]Kim Wuyts
, Riccardo Scandariato, Geert Claeys, Wouter Joosen:
Hardening XDS-Based Architectures. ARES 2008: 18-25 - [c12]Riccardo Scandariato, Yoram Ofek, Paolo Falcarin
, Mario Baldi:
Application-Oriented Trust in Distributed Computing. ARES 2008: 434-439 - [c11]Thomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen:
Using Security Patterns to Combine Security Metrics. ARES 2008: 1156-1163 - [c10]Koen Yskout
, Riccardo Scandariato, Bart De Win, Wouter Joosen:
Transforming Security Requirements into Architecture. ARES 2008: 1421-1428 - [c9]Eryk Kylikowski, Riccardo Scandariato, Wouter Joosen:
Using Multi-Level Security Annotations to Improve Software Assurance. HASE 2008: 471-474 - [c8]Mina Deng, Riccardo Scandariato, Danny De Cock, Bart Preneel
, Wouter Joosen:
Identity in federated electronic healthcare. Wireless Days 2008: 1-5 - [e1]Riccardo Scandariato, Giovanni Russello:
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008. ACM 2008, ISBN 978-1-60558-363-1 [contents] - 2007
- [c7]Koen Buyens, Riccardo Scandariato, Wouter Joosen:
Process Activities Supporting Security Principles. COMPSAC (2) 2007: 281-292 - [c6]Johan Grégoire, Koen Buyens, Bart De Win, Riccardo Scandariato, Wouter Joosen:
On the Secure Software Development Process: CLASP and SDL Compared. SESS@ICSE 2007: 1 - [c5]Thomas Heyman, Koen Yskout
, Riccardo Scandariato, Wouter Joosen:
An Analysis of the Security Patterns Landscape. SESS@ICSE 2007: 3 - 2006
- [c4]Paolo Falcarin
, Riccardo Scandariato, Mario Baldi:
Remote Trust with Aspect-Oriented Programming. AINA (1) 2006: 451-458 - [c3]Riccardo Scandariato, Bart De Win, Wouter Joosen:
Towards a measuring framework for security properties of software. QoP 2006: 27-30 - 2004
- [b1]Riccardo Scandariato:
Plicy-based solutions for distributed systems. Polytechnic University of Turin, Italy, 2004 - [c2]Riccardo Scandariato, John C. Knight:
The Design and Evaluation of a Defense System for Internet Worms. SRDS 2004: 164-173 - 2002
- [c1]