Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-50 av 163 << Forrige 1 2 3 4    Neste >>

2017
1 Valebjørg, Emilie; Sindre, Guttorm; Kolås, Line.
Satser på jentene. NOKUT magasinet [Fagblad] 2017-10-12
NORD NTNU Untitled
 
2016
2 Deak, Anca; Stålhane, Tor; Sindre, Guttorm.
Challenges and strategies for motivating software testing personnel. Information and Software Technology 2016 ;Volum 73. s. 1-15
NTNU Untitled
 
3 Gopalakrishnan, Sundar; Sindre, Guttorm.
Activity diagrams with location context: Experimental comparison of colour and icon annotations. I: Information Systems Development: Complexity in Information Systems Development. Association for Information Systems 2016 ISBN 978-83-7875-307-0. s. -
NTNU Untitled
 
4 Gopalakrishnan, Sundar; Sindre, Guttorm.
Use Case Diagrams for Mobile and Multi-channel Information Systems: Experimental Comparison of Colour and Icon Annotations. Lecture Notes in Business Information Processing 2016 ;Volum 248. s. 479-493
NTNU Untitled
 
5 Hafskjold, Bjørn; Fjørtoft, Henning; Gynnild, Vidar; Løkås, Marita; Sindre, Guttorm; Jenkins Slutås, Christina.
Gode vurderingsformer ved NTNU - veien videre. Trondheim: NTNU Norges teknisk-naturvitenskapelige universitet 2016 26 s.
NTNU Untitled
 
6 Pappas, Ilias; Aalberg, Trond; Giannakos, Michail; Jaccheri, Maria Letizia; Mikalef, Patrik; Sindre, Guttorm.
Gender Differences in Computer Science Education: Lessons Learnt from an Empirical Study at NTNU. NIK: Norsk Informatikkonferanse 2016
NTNU Untitled
 
7 Sindre, Guttorm.
Improving IT Education: The Role of Design Science. Improving IT Education: The Role of Design Science (4 hour workshop); 2016-12-14 - 2016-12-14
NTNU Untitled
 
8 Sindre, Guttorm; Eikebrokk, Tom Roar; Karlsen, Anniken Th; Kaasbøll, Jens Johan; Netteland, Grete; Opdahl, Andreas Lothe; Rolland, Knut-Helge Ronæs.
NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi, Proceedings fra NOKOBIT 2016, Bergen, 29.-30. november 2016. : Bibsys OJS 2016 ;Volum 24.300 s. NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi(1)
HISF NTNU UIA UiB UiO WOACT Untitled
 
9 Vegendla, Aparna; Søgaard, Thea Marie; Sindre, Guttorm.
Extending HARM to make Test Cases for Penetration Testing. Lecture Notes in Business Information Processing 2016 ;Volum 249. s. 254-265
NTNU Untitled
 
2015
10 El-Attar, Mohamed; Luqman, Hamza; Karpati, Peter; Sindre, Guttorm; Opdahl, Andreas Lothe.
Extending the UML Statecharts Notation to Model Security Aspects. IEEE Transactions on Software Engineering 2015 ;Volum 41.(7) s. 661-690
IFE NTNU UiB Untitled
 
11 Giannakos, Michail; Aalberg, Trond; Divitini, Monica; Jaccheri, Maria Letizia; Mikalef, Patrick; Pappas, Ilias; Sindre, Guttorm.
Identifying Dropout Factors in Information Technology Education: A Case Study. IEEE Global Engineering Education Conference, EDUCON 2015 s. 1187-1194
NTNU Untitled
 
12 Karpati, Peter; Opdahl, Andreas Lothe; Sindre, Guttorm.
Investigating security threats in architectural context: Experimental evaluations of misuse case maps. Journal of Systems and Software 2015 ;Volum 104. s. 90-111
NTNU UiB Untitled
 
13 Sindre, Guttorm; Fog, Jørgen; Kaasbøll, Jens Johan; Netteland, Grete; Opdahl, Andreas Lothe; Munkvold, Bjørn Erik; Karlsen, Anniken.
NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi, Proceedings fra NOKOBIT 2015, Ålesund, 24.-25. november 2015. : Bibsys OJS 2015 ;Volum 23.300 s. NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi(1)
HISF NTNU UIA UiB UiO Untitled
 
14 Sindre, Guttorm; Giannakos, Michail; Krogstie, Birgit Rognebakke; Munkvold, Robin; Aalberg, Trond.
Project Thinking as a Strategy for University Education. MNT-konferansen 2015; 2015-03-18 - 2015-03-19
NTNU Untitled
 
15 Sindre, Guttorm; Vegendla, Aparna.
E-exams and exam process improvement. NIK: Norsk Informatikkonferanse 2015
NTNU Untitled
 
16 Sindre, Guttorm; Vegendla, Aparna.
E-exams versus paper exams: A comparative analysis of cheating-related security threats and countermeasures. Norsk Informasjonssikkerhetskonferanse (NISK) 2015
NTNU Untitled
 
2014
17 Fallmyr, Terje; Fog, Jørgen; Kaasbøll, Jens; Netteland, Grete; Opdahl, Andreas Lothe; Munkvold, Bjørn Erik; Sindre, Guttorm.
NOKOBIT 2014, Norsk konferanse for organisasjoners bruk av informasjonsteknologi, Høgskolen i Østfold 17 - 19. november 2014. : Norsk konferanse for organisasjoners bruk av informasjonsteknologi 2014 (ISBN 9788251928458) ;Volum 22.255 s. NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi(1)
NORD HISF NTNU UIA UiB UiO Untitled
 
18 Fernandez, Alfredo Perez; Sindre, Guttorm.
Protecting User Privacy when Sharing Mobile Devices: Research in Progress. Norsk Informasjonssikkerhetskonferanse (NISK) 2014 s. -
NTNU Untitled
 
19 Karpati, Peter; Redda, Yonathan Aklilu; Opdahl, Andreas Lothe; Sindre, Guttorm.
Comparing attack trees and misuse cases in an industrial setting. Information and Software Technology 2014 ;Volum 56.(3) s. 294-308
NTNU UiB Untitled
 
20 Sindre, Guttorm.
Et informatikkperspektiv på norsk lovgivning om karakterklager i høyere utdanning. NIK: Norsk Informatikkonferanse 2014 s. -
NTNU Untitled
 
21 Stålhane, Tor; Sindre, Guttorm.
An Experimental Comparison of System Diagrams and Textual Use Cases for the Identification of Safety Hazards. International Journal of Information System Modeling and Design 2014 ;Volum 5.(1) s. 1-24
NTNU Untitled
 
2013
22 Daramola, Olawande; Sindre, Guttorm; Moser, Thomas.
A Tool-based Semantic Framework for Security Requirements Specification. Journal of universal computer science (Online) 2013 ;Volum 19.(13) s. 1940-1962
NTNU Untitled
 
23 Daramola, Olawande; Stålhane, Tor; Omoronyia, Inah; Sindre, Guttorm.
Using Ontologies and Machine Learning for Hazard Identification and Safety Analysis. I: Managing Requirements Knowledge. Springer 2013 ISBN 978-3-642-34418-3. s. 117-142
NTNU Untitled
 
24 Deak, Anca; Sindre, Guttorm.
Analyzing the importance of teaching about testing from alumni survey data. NIK: Norsk Informatikkonferanse 2013 s. 100-109
NTNU Untitled
 
25 Fallmyr, Terje; Bygstad, Bendik; Fog, Jørgen; Habib, Laurence; Munkvold, Bjørn Erik; Opdahl, Andreas Lothe; Sindre, Guttorm.
NOKOBIT 2013 : Universitetet i Stavanger 18. - 20. november 2013 : Norsk konferanse for organisasjoners bruk av informasjonsteknologi. Akademika forlag 2013 (ISBN 978-82-321-0373-7) 228 s. NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi(2013)
NORD HIOA NTNU UIA UiB WOACT Untitled
 
26 Karpati, Peter; Opdahl, Andreas Lothe; Sindre, Guttorm.
HARM: Hacker Attack Representation Method. Communications in Computer and Information Science 2013 ;Volum 170. s. 156-175
NTNU UiB Untitled
 
27 Krogstie, John; Lindland, Odd Ivar; Sindre, Guttorm.
Towards a Deeper Understanding of Quality in Requirements Engineering. I: Seminal Contributions to Information Systems Engineering:25 Years of CAiSE. Springer 2013 ISBN 978-3-642-36925-4. s. 89-102
NTNU Untitled
 
28 Krogstie, John; Sindre, Guttorm; Lindland, Odd Ivar.
20 Years of Quality of Models. I: Seminal Contributions to Information Systems Engineering:25 Years of CAiSE. Springer 2013 ISBN 978-3-642-36925-4. s. 103-107
NTNU Untitled
 
29 Sindre, Guttorm.
Combining boilerplates and faceted requirements. I: Modeling and Quality in Requirements Engineering. Münster in Westfalen, Germany: Verlagshaus Monsenstein und Vannerdat 2013 ISBN 978-3-86991-724-5. s. 199-206
NTNU Untitled
 
30 Sindre, Guttorm; Krogstie, John; Gopalakrishnan, Sundar.
Visually Capturing Usage Context in BPMN by Small Adaptations of Diagram Notation. Lecture Notes in Business Information Processing 2013 ;Volum 147. s. 324-338
NTNU Untitled
 
2012
31 Karpati, Peter; Sindre, Guttorm; Matulevicius, Raimundas.
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks. International Journal of Secure Software Engineering 2012 ;Volum 3.(2) s. 54-73
NTNU Untitled
 
32 Chowdhury, Mohammad; Matulevicius, Raimundas; Karpati, Peter; Sindre, Guttorm.
Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions. Lecture Notes in Computer Science 2012 ;Volum 7195. s. 132-139
NTNU Untitled
 
33 Daramola, Olawande; Moser, Thomas; Sindre, Guttorm; Biffl, Stefan.
Managing Implicit Requirements Using Semantic Case-Based Reasoning. Research Preview. Lecture Notes in Computer Science 2012 ;Volum 7195. s. 172-178
NTNU Untitled
 
34 Daramola, Olawande; Pan, Yushan; Karpati, Peter; Sindre, Guttorm.
A Comparative Review of i*-based and Use Case-based Security Modelling Initiatives. I: Research Challenges in Information Science, Proceedings of the Sixth International Conference on. IEEE Press 2012 ISBN 978-1-4577-1938-7. s. 146-157
NTNU Untitled
 
35 Daramola, Olawande; Sindre, Guttorm; Moser, Thomas.
Ontology-Based Support for Security Requirements Specification Process. Lecture Notes in Computer Science 2012 ;Volum 7567. s. 194-206
NTNU Untitled
 
36 Daramola, Olawande; Sindre, Guttorm; Stålhane, Tor.
Pattern-based Security Requirements Specification Using Boilerplates and Ontologies. I: Second International Workshop on Requirements Patterns (RePa ’12), Proceedings. IEEE Press 2012 ISBN 978-1-4673-4375-6. s. 55-59
NTNU Untitled
 
37 Gopalakrishnan, Sundar; Karpati, Peter; Sindre, Guttorm.
Evaluating a Taxonomy for Mobility Requirements by a Controlled Experiment. ISRN Software Engineering 2012 ;Volum 2012. s. -
NTNU Untitled
 
38 Gopalakrishnan, Sundar; Krogstie, John; Sindre, Guttorm.
Capturing Location in Process Models: Comparing Small Adaptations of Mainstream Notation. International Journal of Information System Modeling and Design 2012 ;Volum 3.(3) s. 24-45
NTNU Untitled
 
39 Pan, Yushan.
Comparison of i*-based and Use Case-based Security Modelling Initiatives for Software Requirements Engineering - An empirical comparison of Secure Tropos and Misuse Cases. Trondheim: Norwegian University of Science and Technology 2012 166 s.
NTNU Untitled
 
40 Sindre, Guttorm.
Boilerplates for Application Interoperability Requirements. NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi 2012 s. 171-184
NTNU Untitled
 
41 Sindre, Guttorm.
Illustrating developer deviations by mal-activity diagrams. I: Norwegian Information Security Conference Norsk Informasjonssikkerhetskonferanse, NISK 2012; University of Nordland, Bodø; 19-21 November 2012. Akademika forlag 2012 ISBN 978-82-321-0012-5. s. -
NTNU Untitled
 
42 Stålhane, Tor; Sindre, Guttorm.
Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases. Lecture Notes in Business Information Processing 2012 ;Volum 113. s. 378-392
NTNU Untitled
 
2011
43 Daramola, Olawande; Stålhane, Tor; Sindre, Guttorm; Omoronyia, Inah.
Enabling Hazard Identification from Requirements and Reuse-Oriented HAZOP Analysis. I: Proceeding of 4th IEE International Workshop on Managing Requirements Knowledge (MARK). IEEE Press 2011 ISBN 978-1-4577-0938-8. s. -
NTNU Untitled
 
44 Gopalakrishnan, Sundar; Krogstie, John; Sindre, Guttorm.
Adapted UML Activity Diagrams for Mobile Work Processes: Experimental comparison of colour and pattern fills. Lecture Notes in Business Information Processing 2011 ;Volum 81. s. 314-331
NTNU Untitled
 
45 Gopalakrishnan, Sundar; Krogstie, John; Sindre, Guttorm.
Extending Use and Misuse Case Diagrams to Capture Multi-channel Information Systems. Communications in Computer and Information Science 2011 ;Volum 251. s. 355-369
NTNU Untitled
 
46 Gopalakrishnan, Sundar; Krogstie, John; Sindre, Guttorm.
Extending Use and Misuse Cases to Capture Mobile Applications. NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi 2011 s. 1-14
NTNU Untitled
 
47 Gopalakrishnan, Sundar; Krogstie, John; Sindre, Guttorm.
Templates for Use and Misuse Cases in Mobile and Multi-Channel Systems. I: Perspectives in Business Informatics Research - Local Proceedings. Riga: Riga Technical University / JUMI Publishing House 2011 ISBN 978-9984-30-197-6. s. 131-138
NTNU Untitled
 
48 Gopalakrishnan, Sundar; Sindre, Guttorm.
Diagram Notations for Mobile Work Processes. Lecture Notes in Business Information Processing 2011 ;Volum 92. s. 52-66
NTNU Untitled
 
49 Karpati, Peter; Opdahl, Andreas Lothe; Sindre, Guttorm.
Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations. I: Proceedings of the Sixth International Conference on Availability, Reliability and Security. IEEE 2011 ISBN 978-1-4577-0979-1. s. 507-514
NTNU UiB Untitled
 
50 Karpati, Peter; Sindre, Guttorm.
Comparing misuse case and mal-activity diagrams for modelling social engineering attacks. 2nd European Security Conference; 2011-06-13 - 2011-06-14
NTNU Untitled
 
    Vis neste liste