Follow
Riccardo Scandariato
Riccardo Scandariato
Head of the Institute of Software Security, Hamburg University of Technology (TUHH)
Verified email at tuhh.de - Homepage
Title
Cited by
Cited by
Year
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen
Requirements Engineering 16 (1), 3-32, 2011
5082011
Predicting vulnerable software components via text mining
R Scandariato, J Walden, A Hovsepyan, W Joosen
IEEE Transactions on Software Engineering 40 (10), 993-1006, 2014
3282014
Predicting vulnerable components: Software metrics vs text mining
J Walden, J Stuckman, R Scandariato
2014 IEEE 25th international symposium on software reliability engineering …, 2014
2242014
On the secure software development process: CLASP, SDL and Touchpoints compared
B De Win, R Scandariato, K Buyens, J Grégoire, W Joosen
Information and software technology 51 (7), 1152-1171, 2009
1612009
A descriptive study of Microsoft’s threat modeling technique
R Scandariato, K Wuyts, W Joosen
Requirements Engineering 20 (2), 163-180, 2015
1462015
An analysis of the security patterns landscape
T Heyman, K Yskout, R Scandariato, W Joosen
Third International Workshop on Software Engineering for Secure Systems …, 2007
1082007
Software vulnerability prediction using text analysis techniques
A Hovsepyan, R Scandariato, W Joosen, J Walden
status: accepted, 2012
1032012
Threat analysis of software systems: A systematic literature review
K Tuma, G Calikli, R Scandariato
Journal of Systems and Software 144, 275-294, 2018
872018
Using security patterns to combine security metrics
T Heyman, R Scandariato, C Huygens, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
782008
On the secure software development process: CLASP and SDL compared
J Gregoire, K Buyens, B De Win, R Scandariato, W Joosen
Third International Workshop on Software Engineering for Secure Systems …, 2007
752007
Empirical evaluation of a privacy-focused threat modeling methodology
K Wuyts, R Scandariato, W Joosen
Journal of Systems and Software 96, 122-138, 2014
702014
Maintainability prediction: A regression analysis of measures of evolving systems
JH Hayes, L Zhao
21st IEEE International Conference on Software Maintenance (ICSM'05), 601-604, 2005
662005
Do security patterns really help designers?
K Yskout, R Scandariato, W Joosen
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
622015
The effect of dimensionality reduction on software vulnerability prediction models
J Stuckman, J Walden, R Scandariato
IEEE Transactions on Reliability 66 (1), 17-37, 2016
592016
Static analysis versus penetration testing: A controlled experiment
R Scandariato, J Walden, W Joosen
2013 IEEE 24th international symposium on software reliability engineering …, 2013
562013
Design notations for secure software: a systematic literature review
A Van Den Berghe, R Scandariato, K Yskout, W Joosen
Software & Systems Modeling 16 (3), 809-831, 2017
532017
Current and future bots in software development
L Erlenhov, FG de Oliveira Neto, R Scandariato, P Leitner
2019 IEEE/ACM 1st International Workshop on Bots in Software Engineering …, 2019
512019
A system of security patterns
K Yskout, T Heyman, R Scandariato, W Joosen
482006
A privacy-aware conceptual model for handling personal data
T Antignac, R Scandariato, G Schneider
International Symposium on Leveraging Applications of Formal Methods, 942-957, 2016
432016
Does organizing security patterns focus architectural choices?
K Yskout, R Scandariato, W Joosen
2012 34th International Conference on Software Engineering (ICSE), 617-627, 2012
432012
The system can't perform the operation now. Try again later.
Articles 1–20