Goal-driven risk assessment in requirements engineering Y Asnar, P Giorgini, J Mylopoulos Requirements Engineering 16, 101-116, 2011 | 154 | 2011 |
Modelling risk and identifying countermeasure in organizations Y Asnar, P Giorgini Critical Information Infrastructures Security: First International Workshop …, 2006 | 112 | 2006 |
From trust to dependability through risk analysis Y Asnar, P Giorgini, F Massacci, N Zannone The Second International Conference on Availability, Reliability and …, 2007 | 92 | 2007 |
Analyzing business continuity through a multi-layers model Y Asnar, P Giorgini International Conference on Business Process Management, 212-227, 2008 | 46 | 2008 |
Risk as dependability metrics for the evaluation of business solutions: a model-driven approach Y Asnar, R Moretti, M Sebastianis, N Zannone 2008 Third International Conference on Availability, Reliability and …, 2008 | 42 | 2008 |
Perceived risk assessment Y Asnar, N Zannone Proceedings of the 4th ACM Workshop on Quality of Protection, 59-64, 2008 | 33 | 2008 |
A method for security governance, risk, and compliance (GRC): A goal-process approach Y Asnar, F Massacci International School on Foundations of Security Analysis and Design, 152-184, 2011 | 28 | 2011 |
Using risk analysis to evaluate design alternatives Y Asnar, V Bryl, P Giorgini Agent-Oriented Software Engineering VII: 7th International Workshop, AOSE …, 2007 | 27 | 2007 |
Risk modelling and reasoning in goal models Y Asnar, P Giorgini, J Mylopoulos Universitą degli Studi di Trento-Dipartimento di Informatica e Telecomunicazioni, 2006 | 27 | 2006 |
Secure and dependable patterns in organizations: An empirical approach Y Asnar, P Giorgini, F Massacci, A Saidane, R Bonato, V Meduri, ... 15th IEEE International Requirements Engineering Conference (RE 2007), 287-292, 2007 | 26 | 2007 |
A continuous fusion authentication for Android based on keystroke dynamics and touch gesture AN Putri, YDW Asnar, S Akbar 2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016 | 23 | 2016 |
Risk analysis as part of the requirements engineering process Y Asnar, P Giorgini University of Trento, 2007 | 23 | 2007 |
Computer aided threat identification Y Asnar, T Li, F Massacci, F Paci 2011 IEEE 13th Conference on Commerce and Enterprise Computing, 145-152, 2011 | 19 | 2011 |
A vulnerability scanning tool for session management vulnerabilities R Lukanta, Y Asnar, AI Kistijantoro 2014 International conference on data and software engineering (ICODSE), 1-6, 2014 | 17 | 2014 |
Web application fuzz testing I Andrianto, MMI Liem, YDW Asnar 2017 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2017 | 15 | 2017 |
Applying tropos to socio-technical system design and runtime configuration F Dalpiaz, R Ali, Y Asnar, V Bryl, P Giorgini | 15 | 2008 |
Fraud detection based-on data mining on Indonesian E-Procurement System (SPSE) HA Arief, GAP Saptawati, YDW Asnar 2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016 | 14 | 2016 |
Vulnerability detection in php web application using lexical analysis approach with machine learning DR Anbiya, A Purwarianti, Y Asnar 2018 5th International Conference on Data and Software Engineering (ICoDSE), 1-6, 2018 | 12 | 2018 |
Static code analysis tools with the taint analysis method for detecting web application vulnerability AF Maskur, YDW Asnar 2019 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2019 | 10 | 2019 |
Realizing Trustworthy Business Services Through a New GRC Approach Y Asnar, HW Lim, F Massacci, C Worledge ISACA - JOnline 2, 2010 | 10* | 2010 |