emfase
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
emfase [2016/03/03 15:20] – [Experiments] katsiaryna.labunets@unitn.it | emfase [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 38: | Line 38: | ||
===== Partners ===== | ===== Partners ===== | ||
- | University of Trento (Coordinator), | + | University of Trento (Coordinator, Italy), SINTEF, DeepBlue |
===== Project Internal Information ===== | ===== Project Internal Information ===== | ||
Line 44: | Line 44: | ||
Please check [[https:// | Please check [[https:// | ||
+ | ===== Project presentation ===== | ||
+ | {{: | ||
Line 70: | Line 71: | ||
* Final result: excel file with threats and controls, presentations, | * Final result: excel file with threats and controls, presentations, | ||
* Feedback: questionnaire, | * Feedback: questionnaire, | ||
- | - First International Week with Italian Post on Cyber Security in Complex Information Systems (Rome, Italy) | + | - First International Week with Italian Post on Cyber Security in Complex Information Systems |
* Participants: | * Participants: | ||
* Method: CORAS vs SESAR SECRAM (*) | * Method: CORAS vs SESAR SECRAM (*) | ||
Line 98: | Line 99: | ||
- EMFASE SecRAM Evaluation Workshop | - EMFASE SecRAM Evaluation Workshop | ||
* Participants: | * Participants: | ||
- | * Method: SESAR SecRAM (*) + [ BSI Catalog | + | * Method: SESAR SecRAM (*) + [ BSI catalogue |
* Case Study: Remotely Operated Tower (*) | * Case Study: Remotely Operated Tower (*) | ||
* Final result: excel file with requirements, | * Final result: excel file with requirements, | ||
* Feedback: questionnaire, | * Feedback: questionnaire, | ||
+ | === An Empirical Comparison of Tabular vs. Graphical Risk Model Representations === | ||
+ | - UNITN Security Engineering course 2014-15: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking and Health Care Network | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - University of Oslo Model Engineering course 2014-2015: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - PUCRS Information Systems course 2014-15: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking and Health Care Network | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - University of Calabria Cybersecurity professional master course - September 2015: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking and Health Care Network | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - UNITN Security Engineering course 2015-16: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking and Health Care Network | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - EMFASE - Security Risk Assessment Tutorial at SESAR Innovation Days 2015 (Bologna, Italy): | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking | ||
+ | * Final result: responses to the paper-based comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
+ | - EMFASE Online Study on Comprehensibility of Risk Models: | ||
+ | * Participants: | ||
+ | * Representation: | ||
+ | * Scenario: Online Banking | ||
+ | * Final result: responses to the online comprehensibility task | ||
+ | * Feedback: post-task questionnaire | ||
In part (*) means confidential documents are distributed | In part (*) means confidential documents are distributed | ||
===== Deliverables ===== | ===== Deliverables ===== | ||
- | - {{: | + | - {{: |
+ | - {{: | ||
+ | - {{: | ||
+ | - {{: | ||
+ | - {{: | ||
+ | - {{: | ||
+ | |||
===== Publications ===== | ===== Publications ===== | ||
- | | + | * K. Labunets, Y. Li, F. Massacci, F. Paci, M. Ragosta, B. Solhaug, K. Stølen, A. Tedeschi. **Preliminary Experiments on the Relative Comprehensibility of Tabular and Graphical Risk Models**, In //the Proceedings of 5th SESAR Innovation Days (SIDs' |
+ | | ||
* M. de Gramatica, K. Labunets, F. Massacci, F. Paci, and A. Tedeschi. **The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals.** In //Proc. of REFSQ' | * M. de Gramatica, K. Labunets, F. Massacci, F. Paci, and A. Tedeschi. **The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals.** In //Proc. of REFSQ' | ||
+ | * K. Labunets, F. Massacci, F. Paci, M. Ragosta, B. Solhaug, K. Stølen, A. Tedeschi. **A First Empirical Evaluation Framework for Security Risk Assessment Methods in the ATM Domain**, In //the Proceedings of 4th SESAR Innovation Days (SIDs' | ||
* M. Giacalone, R. Mammoliti, F. Massacci, F. Paci, R. Perugino, and C. Selli. **Security Triage: A Report of a Lean Security Requirements Methodology for Cost-Effective Security Analysis.** A short summary appears In //Proc. of EmpiRE Workshop at IEEE RE' | * M. Giacalone, R. Mammoliti, F. Massacci, F. Paci, R. Perugino, and C. Selli. **Security Triage: A Report of a Lean Security Requirements Methodology for Cost-Effective Security Analysis.** A short summary appears In //Proc. of EmpiRE Workshop at IEEE RE' | ||
* K. Labunets, F. Paci, F. Massacci, and R. Ruprai. **An Experiment on Comparing Textual vs. Visual Industrial Methods for Security Risk Assessment.** In //Proc. of EmpiRE Workshop at IEEE RE' | * K. Labunets, F. Paci, F. Massacci, and R. Ruprai. **An Experiment on Comparing Textual vs. Visual Industrial Methods for Security Risk Assessment.** In //Proc. of EmpiRE Workshop at IEEE RE' | ||
emfase.1457014834.txt.gz · Last modified: (external edit)