Threat Analysis of Software Systems: A Systematic Literature Review K Tuma, G Calikli, R Scandariato Journal of Systems and Software, 2018 | 116 | 2018 |
Flaws in flows: Unveiling design flaws via information flow analysis K Tuma, R Scandariato, M Balliu 2019 IEEE International Conference on Software Architecture (ICSA), 191-200, 2019 | 39 | 2019 |
Towards security threats that matter K Tuma, R Scandariato, M Widman, C Sandberg Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and …, 2018 | 38 | 2018 |
Automating the early detection of security design flaws K Tuma, L Sion, R Scandariato, K Yskout Proceedings of the 23rd ACM/IEEE International Conference on Model Driven …, 2020 | 34 | 2020 |
Two architectural threat analysis techniques compared K Tuma, R Scandariato Software Architecture: 12th European Conference on Software Architecture …, 2018 | 27 | 2018 |
Secure data-flow compliance checks between models and code based on automated mappings S Peldszus, K Tuma, D Strüber, J Jürjens, R Scandariato 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering …, 2019 | 21 | 2019 |
Towards automated security design flaw detection L Sion, K Tuma, R Scandariato, K Yskout, W Joosen 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 13 | 2019 |
Finding security threats that matter: Two industrial case studies K Tuma, C Sandberg, U Thorsson, M Widman, T Herpel, R Scandariato Journal of Systems and Software 179, 111003, 2021 | 11 | 2021 |
Inspection guidelines to identify security design flaws K Tuma, D Hosseini, K Malamas, R Scandariato Proceedings of the 13th European Conference on Software Architecture-Volume …, 2019 | 11 | 2019 |
Seven pain points of threat analysis and risk assessment in the automotive domain K Tuma, M Widman IEEE Security & Privacy 19 (5), 78-82, 2021 | 4 | 2021 |
Efficiency and automation in threat analysis of software systems K Tuma PQDT-Global, 2021 | 4 | 2021 |
Back to the Drawing Board S Jasser, K Tuma, R Scandariato, M Riebisch Proceedings of the 4th International Conference on Information Systems …, 2018 | 4 | 2018 |
Towards a Security Stress-Test for Cloud Configurations F Minna, F Massacci, K Tuma 2022 IEEE 15th International Conference on Cloud Computing (CLOUD), 191-196, 2022 | 3 | 2022 |
Checking security compliance between models and code K Tuma, S Peldszus, D Strüber, R Scandariato, J Jürjens Software and Systems Modeling 22 (1), 273-296, 2023 | 2 | 2023 |
Finding Security Threats That Matter: An Industrial Case Study K Tuma, C Sandberg, U Thorsson, M Widman, R Scandariato arXiv preprint arXiv:1910.03422, 2019 | 2 | 2019 |
Precise Analysis of Purpose Limitation in Data Flow Diagrams H Alshareef, K Tuma, S Stucki, G Schneider, R Scandariato Proceedings of the 17th International Conference on Availability …, 2022 | 1 | 2022 |
The role of diversity in cybersecurity risk analysis: an experimental plan K Tuma, R Van Der Lee Proceedings of the Third Workshop on Gender Equality, Diversity, and …, 2022 | 1 | 2022 |
On the measures of success in replication of controlled experiments with STRIDE W Mbaka, K Tuma International Journal of Software Engineering and Knowledge Engineering, 2023 | | 2023 |
Impact of Gender on the Evaluation of Security Decisions W Mbaka, K Tuma arXiv preprint arXiv:2310.04097, 2023 | | 2023 |
Delta Security Certification for Software Supply Chains Á Milánkovich, K Tuma IEEE Security & Privacy, 2023 | | 2023 |