default search action
Katja Tuma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Winnie Mbaka, Katja Tuma:
Role of Gender in the Evaluation of Security Decisions. IEEE Secur. Priv. 22(2): 38-48 (2024) - [j7]Winnie Mbaka, Katja Tuma:
On the Measures of Success in Replication of Controlled Experiments with STRIDE. Int. J. Softw. Eng. Knowl. Eng. 34(4): 623-650 (2024) - [c17]André Palheiros Da Silva, Winnie Mbaka, Johann Mayer, Jan-Willem Bullee, Katja Tuma:
Does trainer gender make a difference when delivering phishing training? A new experimental design to capture bias. EASE 2024: 130-139 - [c16]Paloma Díaz, Paula Alexandra Silva, Katja Tuma:
The Equality Maturity Model: An Actionable Tool to Advance Gender Balance in Leadership and Participation Roles. EDUCON 2024: 1-5 - [c15]Aurora Papotti, Fabio Massacci, Katja Tuma:
On the Effects of Program Slicing for Vulnerability Detection during Code Inspection: Extended Abstract. ICSE Companion 2024: 368-369 - [c14]Francesco Minna, Agathe Blaise, Fabio Massacci, Katja Tuma:
Automated Security Repair for Helm Charts. ICSE Companion 2024: 412-413 - [c13]Simon Schneider, Ananya Saha, Emanuele Mezzi, Katja Tuma, Riccardo Scandariato:
Designing Secure AI-based Systems: a Multi-Vocal Literature Review. SecDev 2024: 13-19 - [i13]Francesco Minna, Fabio Massacci, Katja Tuma:
Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub. CoRR abs/2403.09537 (2024) - [i12]Paloma Díaz, Paula Alexandra Silva, Katja Tuma:
The Equality Maturity Model: an actionable tool to advance gender balance in leadership and participation roles. CoRR abs/2407.02305 (2024) - [i11]Emanuele Mezzi, Aurora Papotti, Fabio Massacci, Katja Tuma:
Risks of uncertainty propagation in Al-augmented security pipelines. CoRR abs/2407.14540 (2024) - [i10]Simon Schneider, Ananya Saha, Emanuele Mezzi, Katja Tuma, Riccardo Scandariato:
Designing Secure AI-based Systems: a Multi-Vocal Literature Review. CoRR abs/2407.18584 (2024) - [i9]Winnie Bahati Mbaka, Katja Tuma:
Usefulness of data flow diagrams and large language models for security threat validation: a registered report. CoRR abs/2408.07537 (2024) - 2023
- [j6]Katsiaryna Labunets, Fabio Massacci, Federica Paci, Katja Tuma:
A new, evidence-based, theory for knowledge reuse in security risk analysis. Empir. Softw. Eng. 28(4): 90 (2023) - [j5]Ákos Milánkovich, Katja Tuma:
Delta Security Certification for Software Supply Chains. IEEE Secur. Priv. 21(6): 24-33 (2023) - [j4]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking security compliance between models and code. Softw. Syst. Model. 22(1): 273-296 (2023) - [i8]Winnie Mbaka, Katja Tuma:
Impact of Gender on the Evaluation of Security Decisions. CoRR abs/2310.04097 (2023) - 2022
- [c12]Hanaa Alshareef, Katja Tuma, Sandro Stucki, Gerardo Schneider, Riccardo Scandariato:
Precise Analysis of Purpose Limitation in Data Flow Diagrams. ARES 2022: 17:1-17:11 - [c11]Francesco Minna, Fabio Massacci, Katja Tuma:
Towards a Security Stress-Test for Cloud Configurations. CLOUD 2022: 191-196 - [c10]Katja Tuma, Romy Van Der Lee:
The Role of Diversity in Cybersecurity Risk Analysis: An Experimental Plan. GE@ICSE 2022: 12-18 - [i7]Francesco Minna, Fabio Massacci, Katja Tuma:
Towards a Security Stress-Test for Cloud Configurations. CoRR abs/2205.14498 (2022) - [i6]Katja Tuma, Winnie Mbaka:
Human Aspect of Threat Analysis: A Replication. CoRR abs/2208.01512 (2022) - [i5]Winnie Mbaka, Katja Tuma:
A replication of a controlled experiment with two STRIDE variants. CoRR abs/2208.01524 (2022) - [i4]Katja Tuma, Romy Van Der Lee:
The Role of Diversity in Cybersecurity Risk Analysis: An Experimental Plan. CoRR abs/2208.01895 (2022) - 2021
- [j3]Katja Tuma, Mathias Widman:
Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain. IEEE Secur. Priv. 19(5): 78-82 (2021) - [j2]Katja Tuma, Christian Sandberg, Urban Thorsson, Mathias Widman, Thomas Herpel, Riccardo Scandariato:
Finding security threats that matter: Two industrial case studies. J. Syst. Softw. 179: 111003 (2021) - [i3]Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens:
Checking Security Compliance between Models and Code. CoRR abs/2108.08579 (2021) - 2020
- [c9]Katja Tuma, Laurens Sion, Riccardo Scandariato, Koen Yskout:
Automating the early detection of security design flaws. MoDELS 2020: 332-342 - [c8]Sven Peldszus, Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings. SE 2020: 51-52
2010 – 2019
- 2019
- [c7]Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato:
Inspection guidelines to identify security design flaws. ECSA (Companion) 2019: 116-122 - [c6]Katja Tuma, Riccardo Scandariato, Musard Balliu:
Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis. ICSA 2019: 191-200 - [c5]Laurens Sion, Katja Tuma, Riccardo Scandariato, Koen Yskout, Wouter Joosen:
Towards Automated Security Design Flaw Detection. ASE Workshops 2019: 49-56 - [c4]Sven Peldszus, Katja Tuma, Daniel Strüber, Jan Jürjens, Riccardo Scandariato:
Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings. MoDELS 2019: 23-33 - [i2]Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato:
Inspection Guidelines to Identify Security Design Flaws. CoRR abs/1906.01961 (2019) - [i1]Katja Tuma, Christian Sandberg, Urban Thorsson, Mathias Widman, Riccardo Scandariato:
Finding Security Threats That Matter: An Industrial Case Study. CoRR abs/1910.03422 (2019) - 2018
- [j1]Katja Tuma, Gül Çalikli, Riccardo Scandariato:
Threat analysis of software systems: A systematic literature review. J. Syst. Softw. 144: 275-294 (2018) - [c3]Katja Tuma, Riccardo Scandariato:
Two Architectural Threat Analysis Techniques Compared. ECSA 2018: 347-363 - [c2]Stefanie Jasser, Katja Tuma, Riccardo Scandariato, Matthias Riebisch:
Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process. ICISSP 2018: 438-446 - 2017
- [c1]Katja Tuma, Riccardo Scandariato, Mathias Widman, Christian Sandberg:
Towards Security Threats that Matter. CyberICPS/SECPRE@ESORICS 2017: 47-62
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint