Cited By
View all- Ryan IRoedig UStol K(2024)Training Developers to Code Securely: Theory and PracticeProceedings of the 2024 ACM/IEEE 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) and 2024 IEEE/ACM Second International Workshop on Software Vulnerability10.1145/3643662.3643956(37-44)Online publication date: 15-Apr-2024
- Pöhn DSeeber SHommel W(2023)Combining SABSA and Vis4Sec to the Process Framework IdMSecMan to Continuously Improve Identity Management Security in Heterogeneous ICT InfrastructuresApplied Sciences10.3390/app1304234913:4(2349)Online publication date: 11-Feb-2023
- Ryan IRoedig UStol KMeng WJensen CCremers CKirda E(2023)Unhelpful Assumptions in Software Security ResearchProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623122(3460-3474)Online publication date: 15-Nov-2023
- Show More Cited By