Follow
Guttorm Sindre
Guttorm Sindre
Verified email at idi.ntnu.no
Title
Cited by
Cited by
Year
Eliciting security requirements with misuse cases
G Sindre, AL Opdahl
Requirements engineering 10 (1), 34-44, 2005
14432005
Understanding quality in conceptual modeling
OI Lindland, G Sindre, A Solvberg
IEEE software 11 (2), 42-49, 1994
12591994
Process models representing knowledge for action: a revised quality framework
J Krogstie, G Sindre, H Jørgensen
European Journal of Information Systems 15 (1), 91-102, 2006
4752006
Templates for misuse case description
G Sindre, AL Opdahl
Proceedings of the 7th International Workshop on Requirements Engineering …, 2001
2572001
Defining quality aspects for conceptual models
J Krogstie, OI Lindland, G Sindre
Information System Concepts, 216-231, 1995
2311995
Towards a deeper understanding of quality in requirements engineering
J Krogstie, OI Lindland, G Sindre
International Conference on Advanced Information Systems Engineering, 82-95, 1995
2071995
Evaluating the quality of information models: empirical testing of a conceptual model quality framework
DL Moody, G Sindre, T Brasethvik, A Solvberg
25th International Conference on Software Engineering, 2003. Proceedings …, 2003
1962003
Experimental comparison of attack trees and misuse cases for security threat identification
AL Opdahl, G Sindre
Information and Software Technology 51 (5), 916-932, 2009
1622009
The REBOOT approach to software reuse
G Sindre, R Conradi, EA Karlsson
Journal of Systems and Software 30 (3), 201-212, 1995
1601995
Capturing security requirements through misuse cases
G Sindre, AL Opdahl
NIK 2001, Norsk Informatikkonferanse 2001, http://www. nik. no/2001 74, 2001
1432001
Evaluating the quality of process models: Empirical testing of a quality framework
DL Moody, G Sindre, T Brasethvik, A Sølvberg
International conference on conceptual modeling, 380-396, 2002
1252002
On the purpose of object-oriented analysis
GM Høydalsvik, G Sindre
ACM Sigplan Notices 28 (10), 240-255, 1993
1241993
A reuse-based approach to determining security requirements
G Sindre, DG Firesmith, AL Opdahl
REFSQ 3, 127-136, 2003
1172003
Mal-activity diagrams for capturing attacks on business processes
G Sindre
International working conference on requirements engineering: foundation for …, 2007
1112007
An analytical evaluation of BPMN using a semiotic quality framework
T Wahl, G Sindre
Advanced Topics in Database Research, Volume 5, 94-105, 2006
992006
Cheating in e-exams and paper exams: the perceptions of engineering students and teachers in Norway
A Chirumamilla, G Sindre, A Nguyen-Duc
Assessment & Evaluation in Higher Education 45 (7), 940-957, 2020
952020
Experimental validation of the learning effect for a pedagogical game on computer fundamentals
G Sindre, L Natvig, M Jahre
IEEE Transactions on Education 52 (1), 10-18, 2008
932008
Evaluating the effectiveness of learning interventions: an information systems case study
DL Moody, G Sindre
792003
A domain ontology building process for guiding requirements elicitation
I Omoronyia, G Sindre, T Stålhane, S Biffl, T Moser, W Sunindyo
International working conference on requirements engineering: Foundation for …, 2010
742010
Challenges and strategies for motivating software testing personnel
A Deak, T Stålhane, G Sindre
Information and software Technology 73, 1-15, 2016
632016
The system can't perform the operation now. Try again later.
Articles 1–20