Follow
Katsiaryna (Kate) Labunets
Title
Cited by
Cited by
Year
An adversarial risk analysis framework for cybersecurity
D Rios Insua, A Couce‐Vieira, JA Rubio, W Pieters, K Labunets, ...
Risk Analysis 41 (1), 16-36, 2021
652021
An experimental comparison of two risk-based security methods
K Labunets, F Massacci, F Paci
ACM/IEEE International Symposium on Empirical Software Engineering and …, 2013
532013
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals
M de Gramatica, K Labunets, F Massacci, F Paci, A Tedeschi
21st International Working Conference on Requirements Engineering …, 2015
402015
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations
K Labunets, F Massacci, F Paci, S Marczak, FM de Oliveira
Proceedings of the 40th International Conference on Software Engineering …, 2018
242018
On the equivalence between graphical and tabular representations for security risk assessment
K Labunets, F Massacci, F Paci
Requirements Engineering: Foundation for Software Quality: 23rd …, 2017
192017
An Experiment on Comparing Textual vs. Visual Industrial Methods for Security Risk Assessment
K Labunets, F Paci, F Massacci, R Ruprai
2014 IEEE 4th International Workshop on Empirical Requirements Engineering …, 2014
192014
Estimating the assessment difficulty of CVSS environmental metrics: an experiment
L Allodi, S Biagioni, B Crispo, K Labunets, F Massacci, W Santos
Future Data and Security Engineering: 4th International Conference, FDSE …, 2017
162017
Graphical vs. Tabular Notations for Risk Models: On the Role of Textual Labels and Complexity
K Labunets, F Massacci, A Tedeschi
11th ACM / IEEE International Symposium on Empirical Software Engineering …, 2017
112017
Modeling structured and unstructured processes: an empirical evaluation
E Cardoso, K Labunets, F Dalpiaz, J Mylopoulos, P Giorgini
Conceptual Modeling: 35th International Conference, ER 2016, Gifu, Japan …, 2016
112016
Techniek van de onmacht
MJG Van Eeten
NSOB, 2010
112010
A first empirical evaluation framework for security risk assessment methods in the ATM domain
K Labunets, F Paci, F Massacci, M Ragosta, B Solhaug
SESAR Innovation Days, 2014
92014
Which Security Catalogue Is Better for Novices?
K Labunets, F Paci, F Massacci
5th IEEE International Workshop on Empirical Requirements Engineering …, 2015
62015
Towards empirical evaluation of automated risk assessment methods
O Gadyatskaya, K Labunets, F Paci
Risks and Security of Internet and Systems: 11th International Conference …, 2017
52017
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context
V Binkhorst, T Fiebig, K Krombholz, W Pieters, K Labunets
USENIX Security Symposium, 2022
42022
No Search Allowed: What Risk Modeling Notation to Choose?
K Labunets
ACM/IEEE International Symposium on Empirical Software Engineering and …, 2018
42018
Empirical assessment of security requirements and architecture: Lessons learned
R Scandariato, F Paci, LM Sang Tran, K Labunets, K Yskout, F Massacci, ...
Engineering Secure Future Internet Services and Systems: Current Research, 35-64, 2014
42014
Preliminary experiments on the relative comprehensibility of tabular and graphical risk models
K Labunets, Y Li, F Massacci, F Paci, M Ragosta, B Solhaug, K Stølen, ...
SESAR Innovation Days, 2015
32015
Empirical validation of security methods
K Labunets, F Massacci
International Symposium on Engineering Secure Software and Systems, ESSoS-DS …, 2013
32013
The Cyber Insurance Landscape
K Labunets, W Pieters, M van Eeten, D Branley-Bell, L Coventry, P Briggs, ...
Security Risk Models for Cyber Insurance, 11-26, 2020
12020
Teaching predictive modeling to junior software engineers-seminar format and its evaluation
K Labunets, A Janes, M Felderer, F Massacci
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–20