Riccardo Scandariato
TitleCited byYear
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen
Requirements Engineering 16 (1), 3-32, 2011
2472011
Predicting vulnerable software components via text mining
R Scandariato, J Walden, A Hovsepyan, W Joosen
IEEE Transactions on Software Engineering 40 (10), 993-1006, 2014
1342014
On the secure software development process: CLASP, SDL and Touchpoints compared
B De Win, R Scandariato, K Buyens, J Grégoire, W Joosen
Information and software technology 51 (7), 1152-1171, 2009
1112009
Predicting vulnerable components: Software metrics vs text mining
J Walden, J Stuckman, R Scandariato
2014 IEEE 25th international symposium on software reliability engineering …, 2014
952014
An analysis of the security patterns landscape
T Heyman, K Yskout, R Scandariato, W Joosen
Proceedings of the Third International Workshop on Software Engineering for …, 2007
912007
A descriptive study of Microsoft’s threat modeling technique
R Scandariato, K Wuyts, W Joosen
Requirements Engineering 20 (2), 163-180, 2015
682015
Using security patterns to combine security metrics
T Heyman, R Scandariato, C Huygens, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
672008
On the secure software development process: CLASP and SDL compared
J Gregoire, K Buyens, BD Win, R Scandariato, W Joosen
Proceedings of the Third International Workshop on Software Engineering for …, 2007
552007
Software vulnerability prediction using text analysis techniques
A Hovsepyan, R Scandariato, W Joosen, J Walden
Proceedings of the 4th international workshop on Security measurements and …, 2012
462012
Software vulnerability prediction using text analysis techniques
A Hovsepyan, R Scandariato, W Joosen, J Walden
status: accepted, 2012
462012
Empirical evaluation of a privacy-focused threat modeling methodology
K Wuyts, R Scandariato, W Joosen
Journal of Systems and Software 96, 122-138, 2014
372014
Do security patterns really help designers?
K Yskout, R Scandariato, W Joosen
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
352015
A system of security patterns
K Yskout, T Heyman, R Scandariato, W Joosen
352006
Static analysis versus penetration testing: A controlled experiment
R Scandariato, J Walden, W Joosen
2013 IEEE 24th international symposium on software reliability engineering …, 2013
312013
Does organizing security patterns focus architectural choices?
K Yskout, R Scandariato, W Joosen
Proceedings of the 34th International Conference on Software Engineering …, 2012
302012
From aspect-oriented models to aspect-oriented code?: the maintenance perspective
A Hovsepyan, R Scandariato, S Van Baelen, Y Berbers, W Joosen
Proceedings of the 9th International Conference on Aspect-Oriented Software …, 2010
302010
Predicting Vulnerable Classes in an Android Application
R Scandariato, J Walden
status: published, 1-6, 2012
282012
Change patterns
K Yskout, R Scandariato, W Joosen
Software and Systems Modeling, 1-24, 2012
282012
Application-oriented trust in distributed computing
R Scandariato, Y Ofek, P Falcarin, M Baldi
2008 Third International Conference on Availability, Reliability and …, 2008
272008
The security twin peaks
T Heyman, K Yskout, R Scandariato, H Schmidt, Y Yu
International Symposium on Engineering Secure Software and Systems, 167-180, 2011
262011
The system can't perform the operation now. Try again later.
Articles 1–20