Yudistira Asnar
Título
Citado por
Citado por
Año
Goal-driven risk assessment in requirements engineering
Y Asnar, P Giorgini, J Mylopoulos
Requirements Engineering 16 (2), 101-116, 2011
1162011
Modelling risk and identifying countermeasure in organizations
Y Asnar, P Giorgini
International Workshop on Critical Information Infrastructures Security, 55-66, 2006
922006
From trust to dependability through risk analysis
Y Asnar, P Giorgini, F Massacci, N Zannone
The Second International Conference on Availability, Reliability and …, 2007
792007
Risk as dependability metrics for the evaluation of business solutions: a model-driven approach
Y Asnar, R Moretti, M Sebastianis, N Zannone
2008 Third International Conference on Availability, Reliability and …, 2008
372008
Analyzing business continuity through a multi-layers model
Y Asnar, P Giorgini
International Conference on Business Process Management, 212-227, 2008
352008
Perceived risk assessment
Y Asnar, N Zannone
Proceedings of the 4th ACM Workshop on Quality of Protection, 59-64, 2008
282008
Using risk analysis to evaluate design alternatives
Y Asnar, V Bryl, P Giorgini
International Workshop on Agent-Oriented Software Engineering, 140-155, 2006
282006
Secure and dependable patterns in organizations: An empirical approach
Y Asnar, P Giorgini, F Massacci, A Saidane, R Bonato, V Meduri, ...
15th IEEE International Requirements Engineering Conference (RE 2007), 287-292, 2007
252007
Risk analysis as part of the requirements engineering process
Y Asnar, P Giorgini
University of Trento, 2007
232007
Risk modelling and reasoning in goal models
Y Asnar, P Giorgini, J Mylopoulos
University of Trento, 2006
222006
A method for security governance, risk, and compliance (GRC): a goal-process approach
Y Asnar, F Massacci
International School on Foundations of Security Analysis and Design, 152-184, 2011
192011
Computer aided threat identification
Y Asnar, T Li, F Massacci, F Paci
2011 IEEE 13th Conference on Commerce and Enterprise Computing, 145-152, 2011
182011
Applying tropos to socio-technical system design and runtime configuration
F Dalpiaz, R Ali, Y Asnar, V Bryl, P Giorgini
152008
A vulnerability scanning tool for session management vulnerabilities
R Lukanta, Y Asnar, AI Kistijantoro
2014 International Conference on Data and Software Engineering (ICODSE), 1-6, 2014
102014
Realizing Trustworthy Business Services Through a New GRC Approach
Y Asnar, HW Lim, F Massacci, C Worledge
ISACA - JOnline 2, 2010
9*2010
An evaluation of business solutions in manufacturing enterprises
Y Asnar, P Giorgini, P Ciancarini, R Moretti, M Sebastianis, N Zannone
International Journal of Business Intelligence and Data Mining 3 (3), 305-329, 2008
92008
Security and privacy requirements at organizational level
Y Asnar, R Bonato, V Bryl, L Compagna, K Dolinar, P Giorgini, ...
SERENITY Deliverable A 1, 2006
8*2006
Reshaping software engineering education towards 2020 engineers
I Liem, Y Asnar, S Akbar, A Mulyanto, Y Widyani
2014 IEEE 27th Conference on Software Engineering Education and Training …, 2014
72014
A continuous fusion authentication for Android based on keystroke dynamics and touch gesture
AN Putri, YDW Asnar, S Akbar
2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016
62016
Organizational Patterns for Security and Dependability: from design to application
Y Asnar, F Massacci, A Saidane, C Riccucci, M Felici, A Tedeschi, ...
International Journal of Secure Software Engineering (IJSSE) 2 (3), 1-22, 2011
62011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20