Goal-driven risk assessment in requirements engineering Y Asnar, P Giorgini, J Mylopoulos Requirements Engineering 16 (2), 101-116, 2011 | 145 | 2011 |
Modelling risk and identifying countermeasure in organizations Y Asnar, P Giorgini International Workshop on Critical Information Infrastructures Security, 55-66, 2006 | 106 | 2006 |
From trust to dependability through risk analysis Y Asnar, P Giorgini, F Massacci, N Zannone The Second International Conference on Availability, Reliability and …, 2007 | 86 | 2007 |
Risk as dependability metrics for the evaluation of business solutions: a model-driven approach Y Asnar, R Moretti, M Sebastianis, N Zannone 2008 Third International Conference on Availability, Reliability and …, 2008 | 40 | 2008 |
Analyzing business continuity through a multi-layers model Y Asnar, P Giorgini International Conference on Business Process Management, 212-227, 2008 | 39 | 2008 |
Perceived risk assessment Y Asnar, N Zannone Proceedings of the 4th ACM Workshop on Quality of Protection, 59-64, 2008 | 31 | 2008 |
Using risk analysis to evaluate design alternatives Y Asnar, V Bryl, P Giorgini International Workshop on Agent-Oriented Software Engineering, 140-155, 2006 | 28 | 2006 |
Secure and dependable patterns in organizations: An empirical approach Y Asnar, P Giorgini, F Massacci, A Saidane, R Bonato, V Meduri, ... 15th IEEE International Requirements Engineering Conference (RE 2007), 287-292, 2007 | 26 | 2007 |
A method for security governance, risk, and compliance (GRC): a goal-process approach Y Asnar, F Massacci International School on Foundations of Security Analysis and Design, 152-184, 2011 | 24 | 2011 |
Risk analysis as part of the requirements engineering process Y Asnar, P Giorgini University of Trento, 2007 | 23 | 2007 |
Risk modelling and reasoning in goal models Y Asnar, P Giorgini, J Mylopoulos University of Trento, 2006 | 23 | 2006 |
Computer aided threat identification Y Asnar, T Li, F Massacci, F Paci 2011 IEEE 13th Conference on Commerce and Enterprise Computing, 145-152, 2011 | 20 | 2011 |
A continuous fusion authentication for Android based on keystroke dynamics and touch gesture AN Putri, YDW Asnar, S Akbar 2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016 | 16 | 2016 |
A vulnerability scanning tool for session management vulnerabilities R Lukanta, Y Asnar, AI Kistijantoro 2014 International Conference on Data and Software Engineering (ICODSE), 1-6, 2014 | 15 | 2014 |
Applying tropos to socio-technical system design and runtime configuration F Dalpiaz, R Ali, Y Asnar, V Bryl, P Giorgini | 15 | 2008 |
Realizing Trustworthy Business Services Through a New GRC Approach Y Asnar, HW Lim, F Massacci, C Worledge ISACA - JOnline 2, 2010 | 10* | 2010 |
Web application fuzz testing I Andrianto, MMI Liem, YDW Asnar 2017 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2017 | 9 | 2017 |
Reshaping software engineering education towards 2020 engineers I Liem, Y Asnar, S Akbar, A Mulyanto, Y Widyani 2014 IEEE 27th Conference on Software Engineering Education and Training …, 2014 | 9 | 2014 |
An evaluation of business solutions in manufacturing enterprises Y Asnar, P Giorgini, P Ciancarini, R Moretti, M Sebastianis, N Zannone International Journal of Business Intelligence and Data Mining 3 (3), 305-329, 2008 | 9 | 2008 |
Vulnerability detection in php Web application using lexical analysis approach with machine learning DR Anbiya, A Purwarianti, Y Asnar 2018 5th International Conference on Data and Software Engineering (ICoDSE), 1-6, 2018 | 8 | 2018 |