Follow
Katsiaryna (Kate) Labunets
Title
Cited by
Cited by
Year
An adversarial risk analysis framework for cybersecurity
D Rios Insua, A Couce‐Vieira, JA Rubio, W Pieters, K Labunets, ...
Risk Analysis 41 (1), 16-36, 2021
952021
An experimental comparison of two risk-based security methods
K Labunets, F Massacci, F Paci
ACM/IEEE International Symposium on Empirical Software Engineering and …, 2013
572013
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals
M de Gramatica, K Labunets, F Massacci, F Paci, A Tedeschi
21st International Working Conference on Requirements Engineering …, 2015
432015
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations
K Labunets, F Massacci, F Paci, S Marczak, FM de Oliveira
Empirical Software Engineering 22 (6), 3017-3056, 2017
262017
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context
V Binkhorst, T Fiebig, K Krombholz, W Pieters, K Labunets
USENIX Security Symposium, 2022
242022
On the equivalence between graphical and tabular representations for security risk assessment
K Labunets, F Massacci, F Paci
Requirements Engineering: Foundation for Software Quality: 23rd …, 2017
232017
Estimating the assessment difficulty of CVSS environmental metrics: an experiment
L Allodi, S Biagioni, B Crispo, K Labunets, F Massacci, W Santos
Future Data and Security Engineering: 4th International Conference, FDSE …, 2017
222017
An Experiment on Comparing Textual vs. Visual Industrial Methods for Security Risk Assessment
K Labunets, F Paci, F Massacci, R Ruprai
2014 IEEE 4th International Workshop on Empirical Requirements Engineering …, 2014
202014
Modeling structured and unstructured processes: an empirical evaluation
E Cardoso, K Labunets, F Dalpiaz, J Mylopoulos, P Giorgini
Conceptual Modeling: 35th International Conference, ER 2016, Gifu, Japan …, 2016
152016
Graphical vs. Tabular Notations for Risk Models: On the Role of Textual Labels and Complexity
K Labunets, F Massacci, A Tedeschi
11th ACM / IEEE International Symposium on Empirical Software Engineering …, 2017
112017
Which Security Catalogue Is Better for Novices?
K Labunets, F Paci, F Massacci
5th IEEE International Workshop on Empirical Requirements Engineering …, 2015
92015
A first empirical evaluation framework for security risk assessment methods in the ATM domain
K Labunets, F Paci, F Massacci, M Ragosta, B Solhaug
Proc. of SIDs, 2014
82014
How Different Elements of Audio Affect the Word Error Rate of Transcripts in Automated Medical Reporting
E Kwint, A Zoet, K Labunets, S Brinkkemper
Porceedings of the 17th International Joint Conference on Biomedical …, 2023
62023
Towards empirical evaluation of automated risk assessment methods
O Gadyatskaya, K Labunets, F Paci
Risks and Security of Internet and Systems: 11th International Conference …, 2017
52017
Empirical assessment of security requirements and architecture: Lessons learned
R Scandariato, F Paci, LM Sang Tran, K Labunets, K Yskout, F Massacci, ...
Engineering Secure Future Internet Services and Systems: Current Research, 35-64, 2014
52014
No Search Allowed: What Risk Modeling Notation to Choose?
K Labunets
ACM/IEEE International Symposium on Empirical Software Engineering and …, 2018
42018
Preliminary experiments on the relative comprehensibility of tabular and graphical risk models
K Labunets, Y Li, F Massacci, F Paci, M Ragosta, B Solhaug, K Stølen, ...
SESAR Innovation Days, 2015
32015
Empirical validation of security methods
K Labunets, F Massacci
International Symposium on Engineering Secure Software and Systems, ESSoS-DS …, 2013
32013
Supporting cyberinsurance from a behavioural choice perspective
K Labunets, W Pieters, P van Gelder, M van Eeten, D Branley-Bell, ...
CYBECO-WP7-D7. 1-v1. 0-TUD, 2019
22019
Security Risk Assessment Methods: An Evaluation Framework and Theoretical Model of the Criteria Behind Methods' Success
K Labunets
University of Trento, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20