An experimental comparison of two risk-based security methods K Labunets, F Massacci, F Paci ACM/IEEE International Symposium on Empirical Software Engineering and …, 2013 | 50 | 2013 |
An adversarial risk analysis framework for cybersecurity D Rios Insua, A Couce‐Vieira, JA Rubio, W Pieters, K Labunets, ... Risk Analysis 41 (1), 16-36, 2021 | 46 | 2021 |
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals M de Gramatica, K Labunets, F Massacci, F Paci, A Tedeschi 21st International Working Conference on Requirements Engineering …, 2015 | 36 | 2015 |
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations K Labunets, F Massacci, F Paci, S Marczak, FM de Oliveira Empirical Software Engineering 22 (6), 3017-3056, 2017 | 21 | 2017 |
On the equivalence between graphical and tabular representations for security risk assessment K Labunets, F Massacci, F Paci International Working Conference on Requirements Engineering: Foundation for …, 2017 | 18 | 2017 |
An Experiment on Comparing Textual vs. Visual Industrial Methods for Security Risk Assessment K Labunets, F Paci, F Massacci, R Ruprai 2014 IEEE 4th International Workshop on Empirical Requirements Engineering …, 2014 | 18 | 2014 |
Estimating the assessment difficulty of CVSS environmental metrics: an experiment L Allodi, S Biagioni, B Crispo, K Labunets, F Massacci, W Santos International Conference on Future Data and Security Engineering, 23-39, 2017 | 13 | 2017 |
Techniek van de onmacht M Van Eeten, C Hernandez Ganan, FS Gürses, RS van Wegberg, ... Nederlandse School voor Openbaar Bestuur, 2010 | 11 | 2010 |
Modeling structured and unstructured processes: an empirical evaluation E Cardoso, K Labunets, F Dalpiaz, J Mylopoulos, P Giorgini International Conference on Conceptual Modeling, 347-361, 2016 | 10 | 2016 |
Graphical vs. Tabular Notations for Risk Models: On the Role of Textual Labels and Complexity K Labunets, F Massacci, A Tedeschi 11th ACM / IEEE International Symposium on Empirical Software Engineering …, 2017 | 9 | 2017 |
A first empirical evaluation framework for security risk assessment methods in the ATM domain K Labunets, F Paci, F Massacci, M Ragosta, B Solhaug SESAR Innovation Days, 2014 | 7 | 2014 |
Towards empirical evaluation of automated risk assessment methods O Gadyatskaya, K Labunets, F Paci International Conference on Risks and Security of Internet and Systems, 77-86, 2016 | 5 | 2016 |
Which Security Catalogue Is Better for Novices? K Labunets, F Paci, F Massacci 5th IEEE International Workshop on Empirical Requirements Engineering …, 2015 | 5 | 2015 |
Tranco: A research-oriented top sites ranking hardened against manipulation MJG van Eeten, C Hernandez Ganan, FS Gürses, RS van Wegberg, ... | 4 | 2019 |
No Search Allowed: What Risk Modeling Notation to Choose? K Labunets ACM/IEEE International Symposium on Empirical Software Engineering and …, 2018 | 4 | 2018 |
Preliminary experiments on the relative comprehensibility of tabular and graphical risk models K Labunets, Y Li, F Massacci, F Paci, M Ragosta, B Solhaug, K Stølen, ... SESAR Innovation Days, 2015 | 3 | 2015 |
Empirical assessment of security requirements and architecture: Lessons learned R Scandariato, F Paci, LM Sang Tran, K Labunets, K Yskout, F Massacci, ... Engineering Secure Future Internet Services and Systems, 35-64, 2014 | 3 | 2014 |
Empirical validation of security methods K Labunets, F Massacci International Symposium on Engineering Secure Software and Systems, ESSoS-DS …, 2013 | 3 | 2013 |
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context V Binkhorst, T Fiebig, K Krombholz, W Pieters, K Labunets USENIX Security Symposium, 2022 | 2 | 2022 |
Teaching predictive modeling to junior software engineers-seminar format and its evaluation K Labunets, A Janes, M Felderer, F Massacci 2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017 | 1 | 2017 |