Publications
Filters: First Letter Of Last Name is S [Clear All Filters]
Change patterns: Co-evolving requirements and architecture,
: K.U.Leuven, 08/2010.
"Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study",
SINTEF report: SINTEF, 01/2011.
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, 2011.
to appear
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, Submitted.
"Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec",
Requirements Engineering Journal, vol. 15(1), 2010.
"Evolution in Relation to Risk and Trust Management",
IEEE Computer, vol. 43, issue 5, 05/2010.
"Evolving Embedded Systems",
IEEE Computer, vol. 43, issue 5, 5/2010.
"An NFR Pattern Approach to Dealing with NFRs",
IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
UMLsec4UML2 - Adopting UMLsec to Support UML2,
, 02/2011.
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"Verifiable control flow properties for Java bytecode",
FAST 2011: Springer Berlin / Heidelberg, to appear, 2011.
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
"Annotation inference for separation logic based verifiers",
Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.
Reykjavik, Iceland, 6-9 June 2011
"The Belgian electronic identity card: a verification case study",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.
Newcastle (UK), 12-14 September 2011, to appear
"Evaluation of experiences from applying the PREDIQT method in an industrial case study",
Secure System Integration and Reliability Improvement (SSIRI), Korea, IEEE Computer Society, 06/2011.
"Evolutionary risk analysis: Expert judgement",
Computer safety, reliability, and security (SAFECOMP), Italy, Springer, 09/2011.
"Incremental Security Verification for Evolving UMLsec models",
Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
"Java Card Architecture for Autonomous yet Secure Evolution of Smart Cards Applications",
Nordsec 2010 Conference Program, Aalto University, Espoo, Finland, 10/2010.
"Mining Java class naming conventions",
27th IEEE International Conference on Software Maintenance: IEEE, 2011.
Abstract