User Tools

Site Tools


validation_of_risk_and_security_requirements_methodologies

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
validation_of_risk_and_security_requirements_methodologies [2017/02/28 16:28]
katsiaryna.labunets@unitn.it
validation_of_risk_and_security_requirements_methodologies [2017/04/23 10:57]
katsiaryna.labunets@unitn.it [Experiments]
Line 66: Line 66:
       * [[unitn-comprehensibility-exp-2015|Sep 16th, 2015]] in Cosenza, Italy at Poste Italiane cyber-security lab (52 participants),​       * [[unitn-comprehensibility-exp-2015|Sep 16th, 2015]] in Cosenza, Italy at Poste Italiane cyber-security lab (52 participants),​
       * [[unitn-comprehensibility-exp-2015|Sep 21st, 2015]] in University of Trento, Italy (51 participants),​       * [[unitn-comprehensibility-exp-2015|Sep 21st, 2015]] in University of Trento, Italy (51 participants),​
-      * Jan-Feb 2016 an online comprehensibility experiment with IT professionals (58 participants),​ +      * [[sid-2015-tutorial|Dec 2nd, 2015]] in Bologna, Italy with ATM professionals (15 participants),​ 
-      * Sep 21st, 2016 in University of Trento, Italy (35 participants),​+      * [[online-comprehensibility-exp-2016|Jan-Feb,  ​2016]] an online comprehensibility experiment with IT professionals (58 participants),​ 
 +      * Sep 21st, 2016 in University of Trento, Italy (35 participants)
 +  - Empirical Evaluation of CVSS Environmental Metrics. 
 +      * [[unitn_cvss_env_exp_2016|Nov 2016]] in University of TrentoItaly (29 participants).
  
  
Line 89: Line 92:
  
 ==== Publications ==== ==== Publications ====
-   * K. Labunets, F. Massacci, F. Paci, S. Marczak, F. Moreira de Oliveira. **Model Comprehension for Security Risk Assessment: An Empirical Comparison of Tabular vs. Graphical Representations** ​To appear in //Empirical Software Engineering//​. Available at SSRN: [[https://​ssrn.com/​abstract=2906745]]+=== Working papers === 
 +  * M. de Gramatica, K. Labunets, F. Massacci, F. Paci, M. Ragosta, A. Tedeschi. **On the Effectiveness of Sourcing Knowledge from Catalogues in Security Risk Assessment**. To be submitted to journal. 
 +  * K. Labunets, F. Massacci, F. Paci. **An Empirical Comparison of Security Risk Assessment Methods**. To be submitted to journal. 
 + 
 +=== Published papers === 
 +   * K. Labunets, F. Massacci, F. Paci, S. Marczak, F. Moreira de Oliveira. **Model Comprehension for Security Risk Assessment: An Empirical Comparison of Tabular vs. Graphical Representations**//Empirical Software Engineering// ​(2014). Available at SSRN: [[https://​ssrn.com/​abstract=2906745]]
   * K. Labunets, F. Massacci, F. Paci. **On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment**. In //​Proceedings of REFSQ'​17//​. {{:​research_activities:​experiments:​labunets-etal-refsq2017.pdf|Authors'​ Draft PDF}}.   * K. Labunets, F. Massacci, F. Paci. **On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment**. In //​Proceedings of REFSQ'​17//​. {{:​research_activities:​experiments:​labunets-etal-refsq2017.pdf|Authors'​ Draft PDF}}.
   * K. Labunets, F. Paci, F. Massacci. **Which Security Catalogue Is Better for Novices?** In //Proc. of EmpiRE Workshop at IEEE RE'​15.//​ {{:​research_activities:​experiments:​2014-winter-school:​labunets-etal-empire-re15-preprint.pdf|PDF (preprint)}}   * K. Labunets, F. Paci, F. Massacci. **Which Security Catalogue Is Better for Novices?** In //Proc. of EmpiRE Workshop at IEEE RE'​15.//​ {{:​research_activities:​experiments:​2014-winter-school:​labunets-etal-empire-re15-preprint.pdf|PDF (preprint)}}
validation_of_risk_and_security_requirements_methodologies.txt · Last modified: 2021/01/29 10:58 (external edit)