default search action
Kristian Beckers
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c71]Fabiola Moyon, Daniel Méndez, Kristian Beckers, Sebastian Klepper:
Using Process Models to Understand Security Standards. SOFSEM 2021: 458-471 - [i7]Tiago Espinha Gasiba, Kristian Beckers, Santiago Suppan, Filip Rezabek:
On the Requirements for Serious Games geared towards Software Developers in the Industry. CoRR abs/2101.02100 (2021) - [i6]James Barela, Tiago Espinha Gasiba, Santiago Reinhard Suppan, Marc Berges, Kristian Beckers:
When Interactive Graphic Storytelling Fails. CoRR abs/2101.02106 (2021) - [i5]Fabiola Moyón Constante, Rafael Soares, Maria Pinto-Albuquerque, Daniel Méndez, Kristian Beckers:
Integration of Security Standards in DevOps Pipelines: An Industry Case Study. CoRR abs/2105.13024 (2021) - [i4]Fabiola Moyón, Daniel Méndez Fernández, Kristian Beckers, Sebastian Klepper:
How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale? CoRR abs/2105.13404 (2021) - [i3]Fabiola Moyón, Daniel Méndez, Kristian Beckers, Sebastian Klepper:
Using Process Models to understand Security Standards. CoRR abs/2105.13413 (2021) - 2020
- [c70]Kristian Beckers, Duncan Ki-Aries, Seok-Won Lee, Yijun Yu:
Welcome from the ESPRE 2020 Organisers. ESPRE@RE 2020: vi - [c69]Sebastian Pape, Ludger Goeke, Alejandro Quintanar, Kristian Beckers:
Conceptualization of a CyberSecurity Awareness Quiz. MSTEC 2020: 61-76 - [c68]Fabiola Moyon, Daniel Méndez, Kristian Beckers, Sebastian Klepper:
How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale? PROFES 2020: 69-87 - [c67]Fabiola Moyon, Rafael Soares, Maria Pinto-Albuquerque, Daniel Méndez, Kristian Beckers:
Integration of Security Standards in DevOps Pipelines: An Industry Case Study. PROFES 2020: 434-452 - [c66]Fabiola Moyón Constante, Christoph Bayr, Daniel Méndez Fernández, Sebastian Dännart, Kristian Beckers:
A Light-Weight Tool for the Self-assessment of Security Compliance in Software Development - An Industry Case. SOFSEM 2020: 403-416
2010 – 2019
- 2019
- [c65]Sebastian Dännart, Fabiola Moyón Constante, Kristian Beckers:
An Assessment Model for Continuous Security Compliance in Large Scale Agile Environments - Exploratory Paper. CAiSE 2019: 529-544 - [c64]Ludger Goeke, Alejandro Quintanar, Kristian Beckers, Sebastian Pape:
PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks. IOSec/MSTEC/FINSEC@ESORICS 2019: 156-171 - [c63]Othonas Soultatos, Konstantinos Fysarakis, George Spanoudakis, Hristo Koshutanski, Ernesto Damiani, Kristian Beckers, Dirk Wortmann, George Bravos, Menelaos Ioannidis:
The THREAT-ARREST Cyber-Security Training Platform. IOSec/MSTEC/FINSEC@ESORICS 2019: 199-214 - [c62]Kristian Beckers, Duncan Ki-Aries, Seok-Won Lee, Nancy Mead:
Preface Sixth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'19). RE Workshops 2019: 133 - [c61]James Barela, Tiago Espinha Gasiba, Santiago Reinhard Suppan, Marc Berges, Kristian Beckers:
When Interactive Graphic Storytelling Fails. RE Workshops 2019: 164-169 - [c60]Tiago Espinha Gasiba, Kristian Beckers, Santiago Suppan, Filip Rezabek:
On the Requirements for Serious Games Geared Towards Software Developers in the Industry. RE 2019: 286-296 - 2018
- [c59]Luca Allodi, Sebastian Banescu, Henning Femmer, Kristian Beckers:
Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS. CODASPY 2018: 119-126 - [c58]Fabiola Moyon, Kristian Beckers, Sebastian Klepper, Philipp Lachberger, Bernd Bruegge:
Towards continuous security compliance in agile software development at scale. RCoSE@ICSE 2018: 31-34 - [c57]Monika Maidl, Dirk Kröselberg, Jochen Christ, Kristian Beckers:
A Comprehensive Framework for Security in Engineering Projects - Based on IEC 62443. ISSRE Workshops 2018: 42-47 - [c56]Dina Aladawy, Kristian Beckers, Sebastian Pape:
PERSUADED: Fighting Social Engineering Attacks with a Serious Game. TrustBus 2018: 103-118 - [e2]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, ESPRE@RE 2018, Banff, AB, Canada, August 20, 2018. IEEE 2018, ISBN 978-1-5386-8420-7 [contents] - [i2]Luca Allodi, Sebastian Banescu, Henning Femmer, Kristian Beckers:
Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS. CoRR abs/1803.07648 (2018) - 2017
- [j11]Peter Schaab, Kristian Beckers, Sebastian Pape:
Social engineering defence mechanisms and counteracting training strategies. Inf. Comput. Secur. 25(2): 206-222 (2017) - [j10]Sasan Amini, Kristian Beckers, Markus Böhm, Fritz Busch, Nihan Celikkaya, Vittorio Cozzolino, Anne Faber, Michael Haus, Dominik Huth, Alfons Kemper, Andreas Kipf, Helmut Krcmar, Florian Matthes, Jörg Ott, Christian Prehofer, Alexander Pretschner, Ömer Uludag, Wolfgang Wörndl:
Informatikforschung für digitale Mobilitätsplattformen - Am Beispiel des TUM Living Lab Connected Mobility. Inform. Spektrum 40(2): 180-191 (2017) - [j9]Kristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel:
A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interface. Reliab. Eng. Syst. Saf. 158: 172-184 (2017) - [j8]Kristian Beckers, Dominik Holling, Isabelle Côté, Denis Hatebur:
A structured hazard analysis and risk assessment method for automotive systems - A descriptive study. Reliab. Eng. Syst. Saf. 158: 185-195 (2017) - [c55]Severin Kacianka, Kristian Beckers, Florian Kelbert, Prachi Kumari:
How Accountability is Implemented and Understood in Research Tools - A Systematic Mapping Study. PROFES 2017: 199-218 - [c54]Severin Kacianka, Kristian Beckers, Florian Kelbert, Prachi Kumari:
Erratum to: How Accountability is Implemented and Understood in Research Tools - A Systematic Mapping Study. PROFES 2017 - [c53]Kristian Beckers, Veronika Fries, Eduard C. Groen, Sebastian Pape:
Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment. REFSQ Workshops 2017 - [c52]Jürgen Dürrwang, Kristian Beckers, Reiner Kriesten:
A Lightweight Threat Analysis Approach Intertwining Safety and Security for the Automotive Domain. SAFECOMP 2017: 305-319 - [c51]Kristian Beckers, Daniel Schosser, Sebastian Pape, Peter Schaab:
A Structured Comparison of Social Engineering Intelligence Gathering Tools. TrustBus 2017: 232-246 - [c50]Simon Rehwald, Amjad Ibrahim, Kristian Beckers, Alexander Pretschner:
ACCBench: A Framework for Comparing Causality Algorithms. CREST@ETAPS 2017: 16-30 - [p3]Sasan Amini, Kristian Beckers, Markus Böhm, Fritz Busch, Nihan Celikkaya, Vittorio Cozzolino, Anne Faber, Michael Haus, Dominik Huth, Alfons Kemper, Andreas Kipf, Helmut Krcmar, Florian Matthes, Jörg Ott, Christian Prehofer, Alexander Pretschner, Ömer Uludag, Wolfgang Wörndl:
Informatik-Forschung für digitale Mobilitätsplattformen. 50 Jahre Universitäts-Informatik in München 2017: 155-172 - [i1]Saahil Ognawala, Ana Petrovska, Kristian Beckers:
An Exploratory Survey of Hybrid Testing Techniques Involving Symbolic Execution and Fuzzing. CoRR abs/1712.06843 (2017) - 2016
- [j7]Kristian Beckers, Jürgen Dürrwang, Dominik Holling:
Standard Compliant Hazard and Threat Analysis for the Automotive Domain. Inf. 7(3): 36 (2016) - [c49]Kristian Beckers, Sebastian Pape, Veronika Fries:
HATCH: Hack And Trick Capricious Humans - A Serious Game on Social Engineering. BCS HCI 2016 - [c48]Duncan Ki-Aries, Shamal Faily, Kristian Beckers:
Persona-Driven Information Security Awareness. BCS HCI 2016 - [c47]Kristian Beckers, Jörg Landthaler, Florian Matthes, Alexander Pretschner, Bernhard Waltl:
Data Accountability in Socio-Technical Systems. BMMDS/EMMSAD 2016: 335-348 - [c46]Peter Schaab, Kristian Beckers, Sebastian Pape:
A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology. HAISA 2016: 241-251 - [c45]Dominik Holling, Alvin Stanescu, Kristian Beckers, Alexander Pretschner, Matthias Gemmar:
Failure Models for Testing Continuous Controllers. ISSRE 2016: 365-375 - [c44]Tong Li, Elda Paja, John Mylopoulos, Jennifer Horkoff, Kristian Beckers:
Security attack analysis using attack patterns. RCIS 2016: 1-13 - [c43]Kristian Beckers, Sebastian Pape:
A Serious Game for Eliciting Social Engineering Security Requirements. RE 2016: 16-25 - [c42]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). RE Workshops 2016: 53 - 2015
- [b1]Kristian Beckers:
Pattern and Security Requirements - Engineering-Based Establishment of Security Standards. Springer 2015, ISBN 978-3-319-16663-6, pp. 1-425 - [j6]Kristian Beckers, Leanid Krautsevich, Artsiom Yautsiukhin:
Using Attack Graphs to Analyze Social Engineering Threats. Int. J. Secur. Softw. Eng. 6(2): 47-69 (2015) - [c41]Tong Li, Jennifer Horkoff, Elda Paja, Kristian Beckers, John Mylopoulos:
Analyzing Attack Strategies Through Anti-goal Refinement. PoEM 2015: 75-90 - [c40]Tong Li, Jennifer Horkoff, Kristian Beckers, Elda Paja, John Mylopoulos:
A Holistic Approach to Attack Modeling and Analysis. iStar 2015: 49-54 - [c39]Tong Li, Elda Paja, John Mylopoulos, Jennifer Horkoff, Kristian Beckers:
Holistic security requirements analysis: An attacker's perspective. RE 2015: 282-283 - [c38]Kristian Beckers, Maritta Heisel, Francisco Moyano, M. Carmen Fernández Gago:
Engineering trust- and reputation-based security controls for future internet systems. SAC 2015: 1344-1349 - [c37]Kristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel:
A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface. SAFECOMP 2015: 90-108 - 2014
- [j5]Kristian Beckers, Isabelle Côté, Ludger Goeke, Selim Güler, Maritta Heisel:
A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain. Int. J. Secur. Softw. Eng. 5(2): 20-43 (2014) - [j4]Kristian Beckers, Maritta Heisel, Denis Hatebur:
Supporting Common Criteria Security Analysis with Problem Frames. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(1): 37-63 (2014) - [c36]Francisco Moyano, Kristian Beckers, M. Carmen Fernández Gago:
Trust-Aware Decision-Making Methodology for Cloud Sourcing. CAiSE 2014: 136-149 - [c35]Kristian Beckers, Leanid Krautsevich, Artsiom Yautsiukhin:
Analysis of Social Engineering Threats with Attack Graphs. DPM/SETOP/QASA 2014: 216-232 - [c34]Kristian Beckers, Stephan Faßbender, Maritta Heisel:
Deriving a pattern language syntax for context-patterns. EuroPLoP 2014: 2:1-2:25 - [c33]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Santiago Suppan:
A meta-pattern and pattern form for context-patterns. EuroPLoP 2014: 5:1-5:23 - [c32]Kristian Beckers, Isabelle Côté, Ludger Goeke:
A catalog of security requirements patterns for the domain of cloud computing systems. SAC 2014: 337-342 - [c31]Kristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel:
Systematic Derivation of Functional Safety Requirements for Automotive Systems. SAFECOMP 2014: 65-80 - [c30]Kristian Beckers, Maritta Heisel, Leanid Krautsevich, Fabio Martinelli, Rene Meis, Artsiom Yautsiukhin:
Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis. SmartGridSec 2014: 30-47 - [c29]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Santiago Suppan:
A Threat Analysis Methodology for Smart Home Scenarios. SmartGridSec 2014: 94-124 - [c28]Francisco Moyano, M. Carmen Fernández Gago, Kristian Beckers, Maritta Heisel:
Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements. SmartGridSec 2014: 166-180 - [c27]Kristian Beckers:
Goal-Based Establishment of an Information Security Management System Compliant to ISO 27001. SOFSEM 2014: 102-113 - [c26]Kristian Beckers, Stephan Faßbender, Stefanos Gritzalis, Maritta Heisel, Christos Kalloniatis, Rene Meis:
Privacy-Aware Cloud Deployment Scenario Selection. TrustBus 2014: 94-105 - [p2]Kristian Beckers, Isabelle Côté, Stefan Fenz, Denis Hatebur, Maritta Heisel:
A Structured Comparison of Security Standards. Engineering Secure Future Internet Services and Systems 2014: 1-34 - [p1]Kristian Beckers, Maritta Heisel, Bjørnar Solhaug, Ketil Stølen:
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System. Engineering Secure Future Internet Services and Systems 2014: 315-344 - [e1]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2014, 25 August, 2014, Karlskrona, Sweden. IEEE Computer Society 2014, ISBN 978-1-4799-6340-9 [contents] - 2013
- [j3]Kristian Beckers, Isabelle Côté, Stephan Faßbender, Maritta Heisel, Stefan Hofbauer:
A pattern-based method for establishing a cloud-specific information security management system - Establishing information security management systems for clouds considering security, privacy, and legal compliance. Requir. Eng. 18(4): 343-395 (2013) - [j2]Kristian Beckers, Isabelle Côté, Stephan Faßbender, Maritta Heisel, Stefan Hofbauer:
Erratum to: A pattern-based method for establishing a cloud-specific information security management system. Requir. Eng. 18(4): 397 (2013) - [c25]Kristian Beckers, Denis Hatebur, Maritta Heisel:
A Problem-Based Threat Analysis in Compliance with Common Criteria. ARES 2013: 111-120 - [c24]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Federica Paci:
Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods. CD-ARES 2013: 178-194 - [c23]Kristian Beckers, Stefan Hofbauer, Gerald Quirchmayr, Christopher C. Wills:
A Method for Re-using Existing ITIL Processes for Creating an ISO 27001 ISMS Process Applied to a High Availability Video Conferencing Cloud Scenario. CD-ARES 2013: 224-239 - [c22]Kristian Beckers, Maritta Heisel, Isabelle Côté, Ludger Goeke, Selim Güler:
Structured Pattern-Based Security Requirements Elicitation for Clouds. ARES 2013: 465-474 - [c21]Kristian Beckers, Maritta Heisel:
A Usability Evaluation of the NESSoS Common Body of Knowledge. ARES 2013: 559-568 - [c20]Kristian Beckers, Stephan Faßbender, Maritta Heisel:
A meta-model for context-patterns. EuroPLoP 2013: 5:1-5:15 - [c19]Kristian Beckers, Maritta Heisel, Thomas Frese, Denis Hatebur:
A structured and model-based hazard analysis and risk assessment method for automotive systems. ISSRE 2013: 238-247 - [c18]Kristian Beckers, Stephan Faßbender, Denis Hatebur, Maritta Heisel, Isabelle Côté:
Common criteria compliant software development (CC-CASD). SAC 2013: 1298-1304 - 2012
- [c17]Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek:
Ontology-Based Identification of Research Gaps and Immature Research Areas. CD-ARES 2012: 1-16 - [c16]Kristian Beckers, Maritta Heisel:
A Foundation for Requirements Analysis of Privacy Preserving Software. CD-ARES 2012: 93-107 - [c15]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Holger Schmidt:
Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation. ARES 2012: 242-248 - [c14]Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr:
A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems. ARES 2012: 307-316 - [c13]Kristian Beckers, Stephan Faßbender, Holger Schmidt:
An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example. ARES 2012: 463-472 - [c12]Kristian Beckers, Stephan Faßbender:
Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and Performance. ARES 2012: 485-494 - [c11]Widura Schwittek, Holger Schmidt, Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel:
A Common Body of Knowledge for Engineering Secure Software and Services. ARES 2012: 499-506 - [c10]Kristian Beckers:
Comparing Privacy Requirements Engineering Approaches. ARES 2012: 574-581 - [c9]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Rene Meis:
A Problem-Based Approach for Computer-Aided Privacy Threat Identification. APF 2012: 1-16 - [c8]Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr:
Conducting a Privacy Impact Analysis for the Analysis of Communication Records. BIR 2012: 148-161 - [c7]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Rene Meis:
Pattern-Based Context Establishment for Service-Oriented Architectures. Software Service and Application Engineering 2012: 81-101 - [c6]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Jan-Christoph Küster, Holger Schmidt:
Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches. ESSoS 2012: 14-21 - [c5]Kristian Beckers, Stephan Faßbender, Jan-Christoph Küster, Holger Schmidt:
A Pattern-Based Method for Identifying and Analyzing Laws. REFSQ 2012: 256-262 - [c4]Kristian Beckers, Stephan Faßbender:
Supporting the context establishment according to ISO 27005 using patterns. Software Engineering (Workshops) 2012: 141-146 - [c3]Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr, Christoph Sorge:
A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example. TrustCom 2012: 992-997 - 2011
- [c2]Kristian Beckers, Holger Schmidt, Jan-Christoph Küster, Stephan Faßbender:
Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing. ARES 2011: 327-333 - 2010
- [c1]Kristian Beckers, Jan Jürjens:
Security and Compliance in Clouds. ISSE 2010: 91-100
2000 – 2009
- 2009
- [j1]Jan Seedorf, Kristian Beckers, Felipe Huici:
Single-message denial-of-service attacks against voice-over-internet protocol terminals. Int. J. Electron. Secur. Digit. Forensics 2(1): 29-34 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint