Yudistira Asnar
Title
Cited by
Cited by
Year
Goal-driven risk assessment in requirements engineering
Y Asnar, P Giorgini, J Mylopoulos
Requirements Engineering 16 (2), 101-116, 2011
1372011
Modelling risk and identifying countermeasure in organizations
Y Asnar, P Giorgini
International Workshop on Critical Information Infrastructures Security, 55-66, 2006
1012006
From trust to dependability through risk analysis
Y Asnar, P Giorgini, F Massacci, N Zannone
The Second International Conference on Availability, Reliability and …, 2007
852007
Risk as dependability metrics for the evaluation of business solutions: a model-driven approach
Y Asnar, R Moretti, M Sebastianis, N Zannone
2008 Third International Conference on Availability, Reliability and …, 2008
402008
Analyzing business continuity through a multi-layers model
Y Asnar, P Giorgini
International Conference on Business Process Management, 212-227, 2008
362008
Perceived risk assessment
Y Asnar, N Zannone
Proceedings of the 4th ACM Workshop on Quality of Protection, 59-64, 2008
302008
Using risk analysis to evaluate design alternatives
Y Asnar, V Bryl, P Giorgini
International Workshop on Agent-Oriented Software Engineering, 140-155, 2006
282006
Secure and dependable patterns in organizations: An empirical approach
Y Asnar, P Giorgini, F Massacci, A Saidane, R Bonato, V Meduri, ...
15th IEEE International Requirements Engineering Conference (RE 2007), 287-292, 2007
262007
A method for security governance, risk, and compliance (GRC): a goal-process approach
Y Asnar, F Massacci
International School on Foundations of Security Analysis and Design, 152-184, 2011
232011
Risk analysis as part of the requirements engineering process
Y Asnar, P Giorgini
University of Trento, 2007
232007
Risk modelling and reasoning in goal models
Y Asnar, P Giorgini, J Mylopoulos
University of Trento, 2006
232006
Computer aided threat identification
Y Asnar, T Li, F Massacci, F Paci
2011 IEEE 13th Conference on Commerce and Enterprise Computing, 145-152, 2011
182011
Applying tropos to socio-technical system design and runtime configuration
F Dalpiaz, R Ali, Y Asnar, V Bryl, P Giorgini
152008
A continuous fusion authentication for Android based on keystroke dynamics and touch gesture
AN Putri, YDW Asnar, S Akbar
2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016
142016
A vulnerability scanning tool for session management vulnerabilities
R Lukanta, Y Asnar, AI Kistijantoro
2014 International Conference on Data and Software Engineering (ICODSE), 1-6, 2014
122014
Realizing Trustworthy Business Services Through a New GRC Approach
Y Asnar, HW Lim, F Massacci, C Worledge
ISACA - JOnline 2, 2010
10*2010
Reshaping software engineering education towards 2020 engineers
I Liem, Y Asnar, S Akbar, A Mulyanto, Y Widyani
2014 IEEE 27th Conference on Software Engineering Education and Training …, 2014
92014
An evaluation of business solutions in manufacturing enterprises
Y Asnar, P Giorgini, P Ciancarini, R Moretti, M Sebastianis, N Zannone
International Journal of Business Intelligence and Data Mining 3 (3), 305-329, 2008
92008
Risk in secure and dependable system: a survey
Y Asnar, P Giorgini, A Mulyanto
Proceedings of the 1st International Conference and Workshop on Risk …, 2007
82007
Rule generator for IPS by using honeypot to fight polymorphic worm
D Silalahi, Y Asnar, RS Perdana
2017 International Conference on Data and Software Engineering (ICoDSE), 1-5, 2017
72017
The system can't perform the operation now. Try again later.
Articles 1–20