Follow
Riccardo Scandariato
Riccardo Scandariato
Head of the Institute of Software Security, Hamburg University of Technology (TUHH)
Verified email at tuhh.de - Homepage
Title
Cited by
Cited by
Year
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen
Requirements Engineering 16 (1), 3-32, 2011
6072011
Predicting vulnerable software components via text mining
R Scandariato, J Walden, A Hovsepyan, W Joosen
IEEE Transactions on Software Engineering 40 (10), 993-1006, 2014
3942014
Predicting vulnerable components: Software metrics vs text mining
J Walden, J Stuckman, R Scandariato
2014 IEEE 25th international symposium on software reliability engineering …, 2014
2542014
A descriptive study of Microsoft’s threat modeling technique
R Scandariato, K Wuyts, W Joosen
Requirements Engineering 20, 163-180, 2015
1852015
On the secure software development process: CLASP, SDL and Touchpoints compared
B De Win, R Scandariato, K Buyens, J Grégoire, W Joosen
Information and software technology 51 (7), 1152-1171, 2009
1722009
Software vulnerability prediction using text analysis techniques
A Hovsepyan, R Scandariato, W Joosen, J Walden
status: accepted, 2012
1332012
Threat analysis of software systems: A systematic literature review
K Tuma, G Calikli, R Scandariato
Journal of Systems and Software 144, 275-294, 2018
1262018
An analysis of the security patterns landscape
T Heyman, K Yskout, R Scandariato, W Joosen
Third International Workshop on Software Engineering for Secure Systems …, 2007
1092007
Empirical evaluation of a privacy-focused threat modeling methodology
K Wuyts, R Scandariato, W Joosen
Journal of Systems and Software 96, 122-138, 2014
822014
On the secure software development process: CLASP and SDL compared
J Gregoire, K Buyens, B De Win, R Scandariato, W Joosen
Third International Workshop on Software Engineering for Secure Systems …, 2007
812007
Using security patterns to combine security metrics
T Heyman, R Scandariato, C Huygens, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
802008
Current and future bots in software development
L Erlenhov, FG de Oliveira Neto, R Scandariato, P Leitner
2019 IEEE/ACM 1st International Workshop on Bots in Software Engineering …, 2019
772019
Do security patterns really help designers?
K Yskout, R Scandariato, W Joosen
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
752015
Maintainability prediction: A regression analysis of measures of evolving systems
JH Hayes, L Zhao
21st IEEE International Conference on Software Maintenance (ICSM'05), 601-604, 2005
692005
The effect of dimensionality reduction on software vulnerability prediction models
J Stuckman, J Walden, R Scandariato
IEEE Transactions on Reliability 66 (1), 17-37, 2016
672016
Design notations for secure software: a systematic literature review
A Van den Berghe, R Scandariato, K Yskout, W Joosen
Software & Systems Modeling 16, 809-831, 2017
622017
Static analysis versus penetration testing: A controlled experiment
R Scandariato, J Walden, W Joosen
2013 IEEE 24th international symposium on software reliability engineering …, 2013
592013
Predicting Vulnerable Classes in an Android Application
R Scandariato, J Walden
status: published, 1-6, 2012
482012
A system of security patterns
K Yskout, T Heyman, R Scandariato, W Joosen
CW Reports, 2006
482006
A privacy-aware conceptual model for handling personal data
T Antignac, R Scandariato, G Schneider
Leveraging Applications of Formal Methods, Verification and Validation …, 2016
462016
The system can't perform the operation now. Try again later.
Articles 1–20