Katja Tuma
Katja Tuma
Chalmers and University of Gothenburg
Verified email at tuma.si - Homepage
Title
Cited by
Cited by
Year
Threat Analysis of Software Systems: A Systematic Literature Review
K Tuma, G Calikli, R Scandariato
Journal of Systems and Software, 2018
222018
Towards security threats that matter
K Tuma, R Scandariato, M Widman, C Sandberg
Computer Security, 47-62, 2017
172017
Two Architectural Threat Analysis Techniques Compared
K Tuma, R Scandariato
European Conference on Software Architecture, 347-363, 2018
62018
Flaws in flows: Unveiling design flaws via information flow analysis
K Tuma, R Scandariato, M Balliu
2019 IEEE International Conference on Software Architecture (ICSA), 191-200, 2019
32019
Back to the Drawing Board
S Jasser, K Tuma, R Scandariato, M Riebisch
Proceedings of the 4th International Conference on Information Systems …, 2018
32018
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings
S Peldszus, K Tuma, D Strüber, J Jürjens, R Scandariato
2019 ACM/IEEE 22nd International Conference on Model Driven Engineering …, 2019
22019
Inspection guidelines to identify security design flaws
K Tuma, D Hosseini, K Malamas, R Scandariato
Proceedings of the 13th European Conference on Software Architecture-Volume …, 2019
12019
Finding Security Threats That Matter: An Industrial Case Study
K Tuma, C Sandberg, U Thorsson, M Widman, R Scandariato
arXiv preprint arXiv:1910.03422, 2019
2019
Towards Automated Security Design Flaw Detection
L Sion, K Tuma, R Scandariato, K Yskout, W Joosen
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
2019
Drevesno preiskovanje Monte Carlo s Thompsonovim vzorčenjem pri igri Prebivalci otoka Catan
K Tuma
Univerza v Ljubljani, 2016
2016
Monte Carlo Tree Search with Thompson Sampling in the Settlers of Catan: Master's Thesis: Master's Study Program Computer Science
K Tuma
K. Tuma, 2016
2016
Generiranje in reševanje sudokuja
K Tuma
Univerza v Ljubljani, 2014
2014
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings (Summary)
S Peldszus, K Tuma, D Strüber, J Jürjens13, R Scandariato
Bang for the Buck: Towards a Cost-Efficient Semi-Automated Threat Analysis
K Tuma
Secure Architecture Design Automation
K Tuma
The system can't perform the operation now. Try again later.
Articles 1–15