An analysis of the security patterns landscape T Heyman, K Yskout, R Scandariato, W Joosen Third International Workshop on Software Engineering for Secure Systems …, 2007 | 110 | 2007 |
Solution-aware data flow diagrams for security threat modeling L Sion, K Yskout, D Van Landuyt, W Joosen Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1425-1432, 2018 | 94 | 2018 |
Do security patterns really help designers? K Yskout, R Scandariato, W Joosen 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015 | 80 | 2015 |
Design notations for secure software: a systematic literature review A Van den Berghe, R Scandariato, K Yskout, W Joosen Software & Systems Modeling 16, 809-831, 2017 | 66 | 2017 |
A system of security patterns K Yskout, T Heyman, R Scandariato, W Joosen | 48* | |
Automating the early detection of security design flaws K Tuma, L Sion, R Scandariato, K Yskout Proceedings of the 23rd ACM/IEEE International Conference on Model Driven …, 2020 | 46 | 2020 |
Sparta: Security & privacy architecture through risk-driven threat assessment L Sion, D Van Landuyt, K Yskout, W Joosen 2018 IEEE International Conference on Software Architecture Companion (ICSA …, 2018 | 46 | 2018 |
Interaction-based privacy threat elicitation L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018 | 43 | 2018 |
Does organizing security patterns focus architectural choices? K Yskout, R Scandariato, W Joosen 2012 34th International Conference on Software Engineering (ICSE), 617-627, 2012 | 41 | 2012 |
The security twin peaks T Heyman, K Yskout, R Scandariato, H Schmidt, Y Yu Engineering Secure Software and Systems: Third International Symposium …, 2011 | 39 | 2011 |
Change patterns: Co-evolving requirements and architecture K Yskout, R Scandariato, W Joosen Software and Systems Modeling 13 (2), 625-648, 2014 | 32 | 2014 |
Security threat modeling: are data flow diagrams enough? L Sion, K Yskout, D Van Landuyt, A van Den Berghe, W Joosen Proceedings of the IEEE/ACM 42nd international conference on software …, 2020 | 31 | 2020 |
Threat modeling: from infancy to maturity K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 30 | 2020 |
Risk-based design security analysis L Sion, K Yskout, D Van Landuyt, W Joosen Proceedings of the 1st International Workshop on Security Awareness from …, 2018 | 29 | 2018 |
Sospa: A system of security design patterns for systematically engineering secure systems PH Nguyen, K Yskout, T Heyman, J Klein, R Scandariato, Y Le Traon 2015 ACM/IEEE 18th International Conference on Model Driven Engineering …, 2015 | 26 | 2015 |
Evolution of security engineering artifacts: a state of the art survey M Felderer, B Katt, P Kalb, J Jürjens, M Ochoa, F Paci, TT Tun, K Yskout, ... Transportation Systems and Engineering: Concepts, Methodologies, Tools, and …, 2015 | 25 | 2015 |
Transforming security requirements into architecture K Yskout, R Scandariato, B De Win, W Joosen 2008 Third International Conference on Availability, Reliability and …, 2008 | 25 | 2008 |
Architecting software with security patterns R Scandariato, K Yskout, T Heyman, W Joosen CW Reports, volume CW515, Department of Computer Science, KU Leuven, 2008 | 21 | 2008 |
An inventory of security patterns K Yskout, T Heyman, R Scandariato, W Joosen Katholieke Universiteit Leuven, Department of Computer Science, 2006 | 21 | 2006 |
Towards automated security design flaw detection L Sion, K Tuma, R Scandariato, K Yskout, W Joosen 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 20 | 2019 |