Current Research Information SysTem In Norway

 English version

Logg inn
Om Cristin
Eksporter til

Viser treff 1-39 av 39

1 Wen, Shao-Fang; Katt, Basel.
Development of Ontology-Based Software Security Learning System with Contextualized Learning Approach. Journal of Advances in Information Technology 2019
NTNU Untitled
2 Wen, Shao-Fang; Katt, Basel.
Managing Software Security Knowledge in Context: An Ontology Based Approach. Information 2019 ;Volum 10.(6)
NTNU Untitled
3 Wen, Shao-Fang; Katt, Basel.
Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security. I: Proceedings of the 23rd International Conference on Evaluation and Assessment in Software Engineering 2019. ACM Digital Library 2019 ISBN 978-3-030-12942-2. s. 90-99
NTNU Untitled
4 Wen, Shao-Fang; Katt, Basel.
Security Knowledge Management in Open Source Software Communities. I: Innovative Security Solutions for Information Technology and Communications. SECITC 2018. Springer 2019 ISBN 978-3-030-12942-2. s. 53-70
NTNU Untitled
5 Wen, Shao-Fang; Katt, Basel.
Towards a Context-Based Approach for Software Security Learning. Journal of Applied Security Research 2019 ;Volum 14.(2)
NTNU Untitled
6 Yamin, Muhammad Mudassar; Katt, Basel.
Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain. CEUR Workshop Proceedings 2019 ;Volum 2381.
NTNU Untitled
7 Yamin, Muhammad Mudassar; Katt, Basel.
Mobile device management (MDM) technologies, issues and challenges. 3rd International Conference on Cryptography, Security and Privacy; 2019-01-19 - 2019-01-21
NTNU Untitled
8 Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios.
Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring. Lecture Notes in Networks and Systems 2019
NTNU Untitled
9 Yamin, Muhammad Mudassar; Katt, Basel; Sattar, Kashif; Bin Ahmed, Maaz.
Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics. Lecture Notes in Networks and Systems 2019
NTNU Untitled
10 Yamin, Muhammad Mudassar; Katt, Basel.
A Survey of Automated Information Exchange Mechanisms Among CERTs. CEUR Workshop Proceedings 2019 ;Volum 2348. s. 311-322
NTNU Untitled
11 Katt, Basel; Nishu, Prasher.
Quantitative security assurance metrics: REST API case studies.. Proceedings of the 12th European Conference on Software Architecture; 2018-09-24 - 2018-09-28
NTNU Untitled
12 Schuckert, Felix; Hildner, Max; Katt, Basel; Langweg, Hanno.
Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox. I: SICHERHEIT 2018. Bonn: Gesellschaft für Informatik e.V. 2018 ISBN 978-3-88579-675-6. s. 107-118
NTNU Untitled
13 Schuckert, Felix; Hildner, Max; Katt, Basel; Langweg, Hanno.
Source Code Patterns of Cross Site Scripting in PHP Open Source Projects. Norsk Informasjonssikkerhetskonferanse (NISK) 2018 ;Volum 11. s. -
NTNU Untitled
14 Weldehawaryat, Goitom Kahsay; Katt, Basel.
Towards a Quantitative Approach for Security Assurance Metrics. I: The Twelfth International Conference on Emerging Security Information, Systems and Technologies; SECURWARE 2018 September 16, 2018 to September 20, 2018 - Venice, Italy. International Academy, Research and Industry Association (IARIA) 2018 ISBN 978-1-61208-661-3. s. 13-20
NTNU Untitled
15 Wen, Shao-Fang; Katt, Basel.
An Ontology-Based Context Model for Managing Security Knowledge in Software Development. I: Proceedings of the 23rd Conference of Open Innovations Association FRUCT. IEEE conference proceedings 2018 ISBN 978-952-68653-6-2. s. 416-424
NTNU Untitled
16 Yamin, Muhammad Mudassar; Katt, Basel.
Modelling and Analyzing Attack-Defense Scenarios for Cyber-Ranges. Nordsec 2018; 2018-11-28 - 2018-11-30
NTNU Untitled
17 Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios; Espen, Torseth; Kowalski, Stewart James.
Make it and Break it: An IoT Smart Home Testbed Case Study. International Conference on Cyber Physical Systems and IoT(CPSIOT 2018); 2018-09-21 - 2018-09-23
NTNU Untitled
18 Yamin, Muhammad Mudassar; Katt, Basel.
Detecting Malicious Windows Commands Using Natural Language Processing Techniques. Lecture Notes in Computer Science 2018 ;Volum 11359 LNCS. s. 157-169
NTNU Untitled
19 Yamin, Muhammad Mudassar; Katt, Basel.
Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper. CEUR Workshop Proceedings 2018 ;Volum 2269.
NTNU Untitled
20 Zoto, Erjon; Kowalski, Stewart James; Frantz, Christopher Konstantin; Lopez Rojas, Edgar Alonso; Katt, Basel.
A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment. IFIP Advances in Information and Communication Technology 2018 ;Volum 531. s. 40-54
NTNU Untitled
21 Zoto, Erjon; Kowalski, Stewart James; Katt, Basel; Frantz, Christopher; Lopez Rojas, Edgar Alonso.
CyberAIMs: A tool for teaching adversarial and systems thinking. I: International Defence and Homeland Security Simulation Workshop, DHSS 2018. Genoa: DIME UNIVERSITÀ DI GENOVA, DIMEG UNIVERSITY OF CALABRIA 2018 ISBN 978-88-85741-12-6. s. 20-28
NTNU Untitled
22 Schuckert, Felix; Katt, Basel; Langweg, Hanno.
Source Code Patterns of SQL Injection Vulnerabilities. I: ARES'17. Proceedings of The 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy — August 29 - September 01, 2017. Association for Computing Machinery (ACM) 2017 ISBN 978-1-4503-5257-4.
NTNU Untitled
23 Katt, Basel; Felderer, Michael.
A process for mastering security evolution in the development lifecycle.. International Journal on Software Tools for Technology Transfer (STTT) 2015 ;Volum 17. s. 245-250
NTNU Untitled
24 Trojer, Thomas; Katt, Basel; Breu, Ruth; Schabetsberger, Thomas; Mair, Richard.
Scenario-Based Templates Supporting Usable Privacy Policy Authoring. University of Amsterdam, Amsterdam Privacy Conference 2012 (APC 2012); 2014-06-18 - 2014-06-18
NTNU Untitled
25 Trojer, Thomas; Katt, Basel; Özata, Tülay; Breu, Ruth; Mangesius, Patrick; Schabetsberger, Thomas.
Factors of Access Control Management in Electronic Healthcare: The Patients' Perspective. 2014 47th Hawaii International Conference on System Sciences; 2014-01-06 - 2014-01-09
NTNU Untitled
26 Zech, Philipp; Katt, Basel.
Security Test Generation by Answer Set Programming. In the 8th International Conference on Software Security and Reliability; 2014-06-30 - 2014-07-02
NTNU Untitled
27 Gander, Matthias; Katt, Basel; Felderer, Michael; Breu, Ruth.
Towards a Model- and Learning-Based Framework for Security Anomaly Detection.. I: Formal Methods for Components and Objects. Springer 2013 ISBN 978-3-642-35886-9. s. 150-168
NTNU Untitled
28 Katt, Basel; Gander, Matthias; Breu, Ruth; Felderer, Michael.
Enhancing Model Driven Security through Pattern Refinement Techniques.. I: Formal Methods for Components and Objects. Springer 2013 ISBN 978-3-642-35886-9. s. 169-183
NTNU Untitled
29 Gander, Matthias; Felderer, Michael; Katt, Basel; Breu, Ruth.
Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing. I: Leveraging Applications of Formal Methods, Verification, and Validation. Springer 2012 ISBN 978-3-642-34781-8. s. 162-180
NTNU Untitled
30 Gander, Matthias; Katt, Basel; Felderer, Michael; Tolbaru, Adrian; Breu, Ruth; Moschitti, A..
Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning. I: Trustworthy Eternal Systemsvia Evolving Software, Data and Knowledge.. Springer 2012 ISBN 978-3-642-45259-8. s. 103-116
NTNU Untitled
31 Trojer, Thomas; Katt, Basel; Breu, Ruth; Schabetsberger, Thomas; Mair, Richard.
Managing Privacy and Effectiveness of Patient-Administered Authorization Policies. International Journal of Computational Models and Algorithms in Medicine (IJCMAM) 2012 s. -
NTNU Untitled
32 Trojer, Thomas; Katt, Basel; Schabetsberger, Thomas; Breu, Ruth; Mair, Richard.
Considering privacy and effectiveness of authorization policies for shared electronic health records.. IHI '12 Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium; 2012-01-28 - 2012-01-30
NTNU Untitled
33 Trojer, Thomas; Katt, Basel; Schabetsberger, Thomas; Breu, Ruth; Mair, Richard.
The Process of Policy Authoring of Patient-Controlled Privacy Preferences. I: Electronic Healthcare. Springer 2012 ISBN 978-3-642-29261-3. s. 97-104
NTNU Untitled
34 Katt, Basel; Trojer, Thomas; Breu, Ruth; Schabetsberger, Thomas; Wozak, Florian.
cover Meeting EHR Security Requirements: SeAAS Approach. I: Seamless Care – Safe Care. IOS Press 2010 ISBN 978-1-60750-562-4. s. 85-91
NTNU Untitled
35 Rempel, Patrick; Katt, Basel; Breu, Ruth.
Supporting Role Based Provisioning with Rules Using OWL and F-Logic. On the Move to Meaningful Internet Systems: OTM 2010. OTM 2010; 2010-10-25 - 2010-10-29
NTNU Untitled
36 Breu, Ruth; Lechner, Alexander; Willburger, Mathias; Katt, Basel.
Workflow Testing. Leveraging Applications of Formal Methods (ISoLA 2008); 2008-10-13 - 2008-10-16
NTNU Untitled
37 Katt, Basel; Breu, Ruth; Hafner, Michael; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian.
Privacy and Access Control for IHE-Based Systems. Electronic Healthcare. eHealth 2008; 2008-09-08 - 2008-09-09
NTNU Untitled
38 Katt, Basel; Hafner, Michael.
Model-Driven Policy Framework for Usage Control-based Privacy. the second International workshop on Model-based Design Of Trustworthy Health Information Systems (MOTHIS); 2008-09-28 - 2008-10-03
NTNU Untitled
39 Katt, Basel; Zhang, Xinwen; Breu, Ruth; Felderer, Michael; Hafner, Michael; Seifert, Jean-Pierre.
A general obligation model and continuity enhanced policy enforcement engine for usage control. SACMAT '08 Proceedings of the 13th ACM symposium on Access control models and technologies; 2008-06-11 - 2008-06-13
NTNU Untitled