Guttorm Sindre
Guttorm Sindre
Dirección de correo verificada de idi.ntnu.no
Título
Citado por
Citado por
Año
Eliciting security requirements with misuse cases
G Sindre, AL Opdahl
Requirements engineering 10 (1), 34-44, 2005
12682005
Understanding quality in conceptual modeling
OI Lindland, G Sindre, A Solvberg
IEEE software 11 (2), 42-49, 1994
11181994
Process models representing knowledge for action: a revised quality framework
J Krogstie, G Sindre, H Jørgensen
European Journal of Information Systems 15 (1), 91-102, 2006
4122006
Templates for misuse case description
G Sindre, AL Opdahl
Proceedings of the 7th International Workshop on Requirements Engineering …, 2001
2362001
Defining quality aspects for conceptual models
J Krogstie, OI Lindland, G Sindre
Information System Concepts, 216-231, 1995
2091995
Towards a deeper understanding of quality in requirements engineering
J Krogstie, OI Lindland, G Sindre
International Conference on Advanced Information Systems Engineering, 82-95, 1995
1831995
Evaluating the quality of information models: empirical testing of a conceptual model quality framework
DL Moody, G Sindre, T Brasethvik, A Solvberg
25th International Conference on Software Engineering, 2003. Proceedings …, 2003
1672003
The REBOOT approach to software reuse
G Sindre, R Conradi, EA Karlsson
Journal of Systems and Software 30 (3), 201-212, 1995
1501995
Experimental comparison of attack trees and misuse cases for security threat identification
AL Opdahl, G Sindre
Information and Software Technology 51 (5), 916-932, 2009
1402009
Capturing security requirements through misuse cases
G Sindre, AL Opdahl
NIK 2001, Norsk Informatikkonferanse 2001, http://www. nik. no/2001, 2001
1282001
Evaluating the quality of process models: Empirical testing of a quality framework
DL Moody, G Sindre, T Brasethvik, A Sølvberg
International Conference on Conceptual Modeling, 380-396, 2002
1082002
On the purpose of object-oriented analysis
GM Høydalsvik, G Sindre
ACM Sigplan Notices 28 (10), 240-255, 1993
1081993
Mal-activity diagrams for capturing attacks on business processes
G Sindre
International working conference on requirements engineering: foundation for …, 2007
1052007
A reuse-based approach to determining security requirements
G Sindre, DG Firesmith, AL Opdahl
Proc. 9th International Workshop on Requirements Engineering: Foundation for …, 2003
1032003
An analytical evaluation of BPMN using a semiotic quality framework
T Wahl, G Sindre
Advanced Topics in Database Research, Volume 5, 94-105, 2006
922006
Experimental validation of the learning effect for a pedagogical game on computer fundamentals
G Sindre, L Natvig, M Jahre
IEEE Transactions on Education 52 (1), 10-18, 2008
782008
Evaluating the effectiveness of learning interventions: an information systems case study
DL Moody, G Sindre
682003
A domain ontology building process for guiding requirements elicitation
I Omoronyia, G Sindre, T Stålhane, S Biffl, T Moser, W Sunindyo
International working conference on requirements engineering: Foundation for …, 2010
552010
A comparison of two approaches to safety analysis based on use cases
T Stålhane, G Sindre
International Conference on Conceptual Modeling, 423-437, 2007
502007
Software engineering students meet interdisciplinary project work and art
L Jaccheri, G Sindre
2007 11th International Conference Information Visualization (IV'07), 925-934, 2007
492007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20