default search action
Denis Hatebur
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c30]Lucas Davi, Denis Hatebur, Maritta Heisel, Roman Wirtz:
Combining Safety and Security in Autonomous Cars Using Blockchain Technologies. SAFECOMP Workshops 2019: 223-234 - 2017
- [j6]Kristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel:
A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interface. Reliab. Eng. Syst. Saf. 158: 172-184 (2017) - [j5]Kristian Beckers, Dominik Holling, Isabelle Côté, Denis Hatebur:
A structured hazard analysis and risk assessment method for automotive systems - A descriptive study. Reliab. Eng. Syst. Saf. 158: 185-195 (2017) - [c29]Nelufar Ulfat-Bunyadi, Denis Hatebur, Maritta Heisel:
Performing a More Realistic Safety Analysis by Means of the Six-Variable Model. Automotive - Safety & Security 2017: 135-148 - 2015
- [j4]Azadeh Alebrahim, Denis Hatebur, Stephan Faßbender, Ludger Goeke, Isabelle Côté:
A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems. Int. J. Secur. Softw. Eng. 6(1): 24-46 (2015) - [c28]Kristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel:
A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface. SAFECOMP 2015: 90-108 - 2014
- [j3]Kristian Beckers, Maritta Heisel, Denis Hatebur:
Supporting Common Criteria Security Analysis with Problem Frames. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(1): 37-63 (2014) - [c27]Azadeh Alebrahim, Denis Hatebur, Ludger Goeke:
Pattern-based and ISO 27001 compliant risk analysis for cloud systems. ESPRE 2014: 42-47 - [c26]Kristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel:
Systematic Derivation of Functional Safety Requirements for Automotive Systems. SAFECOMP 2014: 65-80 - [p2]Kristian Beckers, Isabelle Côté, Stefan Fenz, Denis Hatebur, Maritta Heisel:
A Structured Comparison of Security Standards. Engineering Secure Future Internet Services and Systems 2014: 1-34 - 2013
- [c25]Kristian Beckers, Denis Hatebur, Maritta Heisel:
A Problem-Based Threat Analysis in Compliance with Common Criteria. ARES 2013: 111-120 - [c24]Kristian Beckers, Maritta Heisel, Thomas Frese, Denis Hatebur:
A structured and model-based hazard analysis and risk assessment method for automotive systems. ISSRE 2013: 238-247 - [c23]Kristian Beckers, Stephan Faßbender, Denis Hatebur, Maritta Heisel, Isabelle Côté:
Common criteria compliant software development (CC-CASD). SAC 2013: 1298-1304 - 2012
- [b1]Denis Hatebur:
Pattern- and Component-based Development of Dependable Systems. Deutscher Wissenschaftsverlag 2012, ISBN 978-3-86888-049-6, pp. 1-292 - [c22]Azadeh Alebrahim, Isabelle Côté, Maritta Heisel, Christine Choppy, Denis Hatebur:
Designing architectures from problem descriptions by interactive model transformation. SAC 2012: 1256-1258 - 2011
- [c21]Azadeh Alebrahim, Denis Hatebur, Maritta Heisel:
A Method to Derive Software Architectures from Quality Requirements. APSEC 2011: 322-330 - [c20]Azadeh Alebrahim, Denis Hatebur, Maritta Heisel:
Towards Systematic Integration of Quality Requirements into Software Architecture. ECSA 2011: 17-25 - [c19]Denis Hatebur, Maritta Heisel, Jan Jürjens, Holger Schmidt:
Systematic Development of UMLsec Design Models Based on Security Requirements. FASE 2011: 232-246 - [c18]Isabelle Côté, Maritta Heisel, Holger Schmidt, Denis Hatebur:
UML4PF - A tool for problem-oriented requirements analysis. RE 2011: 349-350 - [p1]Christine Choppy, Denis Hatebur, Maritta Heisel:
Systematic Architectural Design Based on Problem Patterns. Relating Software Requirements and Architectures 2011: 133-159 - 2010
- [c17]Denis Hatebur, Maritta Heisel:
Making Pattern- and Model-Based Software Development More Rigorous. ICFEM 2010: 253-269 - [c16]Denis Hatebur, Maritta Heisel:
A UML Profile for Requirements Analysis of Dependable Software. SAFECOMP 2010: 317-331
2000 – 2009
- 2009
- [c15]Denis Hatebur, Maritta Heisel:
A Foundation for Requirements Analysis of Dependable Software. SAFECOMP 2009: 311-325 - [c14]Denis Hatebur, Maritta Heisel:
Deriving Software Architectures from Problem Descriptions. Software Engineering (Workshops) 2009: 383-392 - 2008
- [j2]Maritta Heisel, Denis Hatebur, Thomas Santen, Dirk Seifert:
Testing Against Requirements Using UML Environment Models. Softwaretechnik-Trends 28(3) (2008) - [c13]Denis Hatebur, Maritta Heisel, Holger Schmidt:
Analysis and Component-based Realization of Security Requirements. ARES 2008: 195-203 - [c12]Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Formal Metamodel for Problem Frames. MoDELS 2008: 68-82 - [c11]Maritta Heisel, Denis Hatebur, Thomas Santen, Dirk Seifen:
Using UML Environment Models for Test Case Generation. Software Engineering (Workshops) 2008: 399-406 - 2007
- [c10]Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Pattern System for Security Requirements Engineering. ARES 2007: 356-365 - [c9]Arnaud Lanoix, Denis Hatebur, Maritta Heisel, Jeanine Souquières:
Enhancing Dependability of Component-Based Systems. Ada-Europe 2007: 41-54 - [c8]Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Security Engineering Process based on Patterns. DEXA Workshops 2007: 734-738 - [c7]Isabelle Côté, Denis Hatebur, Maritta Heisel, Holger Schmidt, Ina Wentzlaff:
A Systematic Account of Problem Frames. EuroPLoP 2007: 749-768 - 2006
- [c6]Christine Choppy, Denis Hatebur, Maritta Heisel:
Component composition through architectural patterns for problem frames. APSEC 2006: 27-36 - [c5]Denis Hatebur, Maritta Heisel, Holger Schmidt:
Security Engineering Using Problem Frames. ETRICS 2006: 238-253 - [c4]Denis Hatebur, Maritta Heisel, Jeanine Souquières:
A Method for Component-Based Software and System Development. EUROMICRO-SEAA 2006: 72-80 - 2005
- [j1]Christine Choppy, Denis Hatebur, Maritta Heisel:
Architectural patterns for problem frames. IEE Proc. Softw. 152(4): 198-208 (2005) - [c3]Maritta Heisel, Denis Hatebur:
A Model-Based Development Process for Embedded System. MBEES 2005: 191-202 - [c2]Denis Hatebur, Maritta Heisel:
Problem Frames and Architectures for Security Problems. SAFECOMP 2005: 390-404 - 2002
- [c1]Thomas Rottke, Denis Hatebur, Maritta Heisel, Monika Heiner:
A Problem-Oriented Approach to Common Criteria Certification. SAFECOMP 2002: 334-346
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint