Paper Search Results
Home Page
More Results
Recommendations from ProNE (based on Citation Graph)
AuthorId: 1722943
Limit: 10
Sort by: score
Embedding: s2_recommendations
IP address: 3.128.226.128
Freq flyer: False
authorId(s): 1722943
Author(s): J. Jürjens
score
citationCount
Paper
Authors
year
More like this
Compare & Contrast
ProNE-s
SciNCL
Specter
GNN
834
UMLsec: Extending UML for Secure Systems Development
J. Jürjens
2002
Similar to this
Compare & Contrast
829
Secure systems development with UML
J. Jürjens
2004
Similar to this
Compare & Contrast
189
Data security and consumer trust in FinTech innovation in Germany
H. Stewart
,
J. Jürjens
2018
Similar to this
Compare & Contrast
185
Towards Development of Secure Systems Using UMLsec
J. Jürjens
2001
Similar to this
Compare & Contrast
159
Formal Eavesdropping and Its Computational Interpretation
M. Abadi
,
J. Jürjens
2001
Similar to this
Compare & Contrast
148
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec
S. Houmb
,
Shareeful Islam
, ...,
K. Schneider
2010
Similar to this
Compare & Contrast
136
Comparing Bug Finding Tools with Reviews and Tests
S. Wagner
,
J. Jürjens
, ...,
P. Trischberger
2005
Similar to this
Compare & Contrast
124
Sound methods and effective tools for model-based security engineering with UML
J. Jürjens
2005
Similar to this
Compare & Contrast
94
Model-Based Security Engineering of Distributed Information Systems Using UMLsec
B. Best
,
J. Jürjens
,
B. Nuseibeh
2007
Similar to this
Compare & Contrast
81
Using UMLsec and goal trees for secure systems development
J. Jürjens
2002
Similar to this
Compare & Contrast
Help
Bulk Download
GitHub
Final Report (YouTube)
JSALT-2023
Contact us (by email)
BETA Version