Katja Tuma
Title
Cited by
Cited by
Year
Threat Analysis of Software Systems: A Systematic Literature Review
K Tuma, G Calikli, R Scandariato
Journal of Systems and Software, 2018
592018
Towards security threats that matter
K Tuma, R Scandariato, M Widman, C Sandberg
Computer Security, 47-62, 2017
252017
Flaws in flows: Unveiling design flaws via information flow analysis
K Tuma, R Scandariato, M Balliu
2019 IEEE International Conference on Software Architecture (ICSA), 191-200, 2019
182019
Secure data-flow compliance checks between models and code based on automated mappings
S Peldszus, K Tuma, D Strüber, J Jürjens, R Scandariato
2019 ACM/IEEE 22nd International Conference on Model Driven Engineering …, 2019
132019
Two architectural threat analysis techniques compared
K Tuma, R Scandariato
European Conference on Software Architecture, 347-363, 2018
122018
Inspection guidelines to identify security design flaws
K Tuma, D Hosseini, K Malamas, R Scandariato
Proceedings of the 13th European Conference on Software Architecture-Volume …, 2019
72019
Towards automated security design flaw detection
L Sion, K Tuma, R Scandariato, K Yskout, W Joosen
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
62019
Automating the early detection of security design flaws
K Tuma, L Sion, R Scandariato, K Yskout
Proceedings of the 23rd ACM/IEEE International Conference on Model Driven …, 2020
52020
Back to the Drawing Board
S Jasser, K Tuma, R Scandariato, M Riebisch
Proceedings of the 4th International Conference on Information Systems …, 2018
42018
Finding security threats that matter: Two industrial case studies
K Tuma, C Sandberg, U Thorsson, M Widman, T Herpel, R Scandariato
Journal of Systems and Software 179, 111003, 2021
22021
Finding Security Threats That Matter: An Industrial Case Study
K Tuma, C Sandberg, U Thorsson, M Widman, R Scandariato
arXiv preprint arXiv:1910.03422, 2019
12019
Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain
K Tuma, M Widman
IEEE Security & Privacy 19 (5), 78-82, 2021
2021
Checking Security Compliance between Models and Code
K Tuma, S Peldszus, D Strüber, R Scandariato, J Jürjens
arXiv preprint arXiv:2108.08579, 2021
2021
Efficiency and Automation in Threat Analysis of Software Systems
T Katja
2020
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings (Summary)
S Peldszus, K Tuma, D Strüber, J Jürjens, R Scandariato
Software Engineering 2020, 2020
2020
Towards Efficiency and Quality Assurance in Threat Analysis of Software Systems
K Tuma
University of Gothenburg, 2018
2018
Drevesno preiskovanje Monte Carlo s Thompsonovim vzorčenjem pri igri Prebivalci otoka Catan
K Tuma
Univerza v Ljubljani, 2016
2016
Monte Carlo Tree Search with Thompson Sampling in the Settlers of Catan: Master's Thesis: Master's Study Program Computer Science
K Tuma
K. Tuma, 2016
2016
Generiranje in reševanje sudokuja
K Tuma
Univerza v Ljubljani, 2014
2014
Bang for the Buck: Towards a Cost-Efficient Semi-Automated Threat Analysis
K Tuma
The system can't perform the operation now. Try again later.
Articles 1–20