default search action
Basel Katt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Muhammad Mudassar Yamin, Ehtesham Hashmi, Mohib Ullah, Basel Katt:
Applications of LLMs for Generating Cyber Security Exercise Scenarios. IEEE Access 12: 143806-143822 (2024) - [j19]Abdullah Zafar, Muhammad Mudassar Yamin, Basel Katt, Espen Torseth:
All flags are not created equal: A deep look into CTF Scoring Algorithms. Expert Syst. Appl. 254: 124436 (2024) - [j18]Shao-Fang Wen, Basel Katt:
Exploring the role of assurance context in system security assurance evaluation: a conceptual model. Inf. Comput. Secur. 32(2): 159-178 (2024) - [e2]Sokratis K. Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage, Naoto Yanai:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - 2023
- [j17]Felix Schuckert, Basel Katt, Hanno Langweg:
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code. Comput. Secur. 128: 103121 (2023) - [j16]Shao-Fang Wen, Basel Katt:
A quantitative security evaluation and analysis model for web applications based on OWASP application security verification standard. Comput. Secur. 135: 103532 (2023) - [j15]Ankur Shukla, Basel Katt, Muhammad Mudassar Yamin:
A quantitative framework for security assurance evaluation and selection of cloud services: a case study. Int. J. Inf. Sec. 22(6): 1621-1650 (2023) - [j14]Fartein Lemjan Færøy, Muhammad Mudassar Yamin, Ankur Shukla, Basel Katt:
Automatic Verification and Execution of Cyber Attack on IoT Devices. Sensors 23(2): 733 (2023) - [j13]Karl Edvard Balto, Muhammad Mudassar Yamin, Andrii Shalaginov, Basel Katt:
Hybrid IoT Cyber Range. Sensors 23(6): 3071 (2023) - [c52]Cecilie Solberg Jørgensen, Ankur Shukla, Basel Katt:
Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges. ESORICS Workshops (2) 2023: 140-153 - [c51]Raphaël Rouquette, Simon Beau, Muhammad Mudassar Yamin, Mohib Ullah, Basel Katt:
Automatic and Realistic Traffic Generation In A Cyber Range. FiCloud 2023: 352-358 - [c50]Saif Hassan, Sarang Shaikh, Muhammad Mudassar Yamin, Basel Katt, Ali Shariq Imran, Mohib Ullah:
Data Driven Skill Assessment for Cybersecurity Exercises. FiCloud 2023: 359-366 - [c49]Shao-Fang Wen, Basel Katt:
A Metamodel for Web Application Security Evaluation. FRUCT 2023: 172-182 - [c48]Aymeric Doussau, Clément Charles Pierre Souyris, Muhammad Mudassar Yamin, Basel Katt, Mohib Ullah:
Intelligent Contextualized Network Traffic Generator in a Cyber Range. SITIS 2023: 9-13 - [e1]Sokratis K. Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla:
Computer Security. ESORICS 2022 International Workshops - CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13785, Springer 2023, ISBN 978-3-031-25459-8 [contents] - 2022
- [j12]Muhammad Mudassar Yamin, Basel Katt:
Modeling and executing cyber security exercise scenarios in cyber ranges. Comput. Secur. 116: 102635 (2022) - [j11]Muhammad Mudassar Yamin, Basel Katt:
Use of cyber attack and defense agents in cyber ranges: A case study. Comput. Secur. 122: 102892 (2022) - [j10]Ankur Shukla, Basel Katt, Livinus Obiora Nweke, Prosper Kandabongee Yeng, Goitom Kahsay Weldehawaryat:
System security assurance: A systematic literature review. Comput. Sci. Rev. 45: 100496 (2022) - [j9]Shao-Fang Wen, Ankur Shukla, Basel Katt:
Developing Security Assurance Metrics to Support Quantitative Security Assurance Evaluation. J. Cybersecur. Priv. 2(3): 587-605 (2022) - [c47]Shao-Fang Wen, Basel Katt:
SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 605-624 - [c46]Muahmmad Mudassar Yamin, Laszlo Erdodi, Espen Torseth, Basel Katt:
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study. HCI (9) 2022: 304-321 - [c45]Felix Schuckert, Hanno Langweg, Basel Katt:
Systematic Generation of XSS and SQLi Vulnerabilities in PHP as Test Cases for Static Code Analysis. ICST Workshops 2022: 261-268 - 2021
- [j8]Muhammad Mudassar Yamin, Basel Katt, Mariusz Nowostawski:
Serious games as a tool to model attack and defense scenarios for cyber-security exercises. Comput. Secur. 110: 102450 (2021) - [j7]Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, Basel Katt:
Weaponized AI for cyber attacks. J. Inf. Secur. Appl. 57: 102722 (2021) - [c44]Mari Langås, Sanna Løfqvist, Basel Katt, Thomas Haugan, Martin Gilje Jaatun:
With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises. EICC 2021: 46-53 - [c43]Shao-Fang Wen, Muhammad Mudassar Yamin, Basel Katt:
Ontology-Based Scenario Modeling for Cyber Security Exercise. EuroS&P Workshops 2021: 249-258 - [c42]Muhammad Mudassar Yamin, Basel Katt, Espen Torseth:
Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study. HCI (15) 2021: 462-483 - [i1]Ankur Shukla, Basel Katt, Livinus Obiora Nweke, Prosper Kandabongee Yeng, Goitom Kahsay Weldehawaryat:
System Security Assurance: A Systematic Literature Review. CoRR abs/2110.01904 (2021) - 2020
- [j6]Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos:
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Comput. Secur. 88 (2020) - [j5]Mats Seljeseth, Muhammad Mudassar Yamin, Basel Katt:
UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices. Sensors 20(22): 6662 (2020) - [c41]Grethe Østby, Basel Katt:
Maturity Modelling to Prepare for Cyber Crisis Escalation and Management. ICISSP 2020: 249-256 - [c40]Grethe Østby, Stewart James Kowalski, Basel Katt:
Towards a Maturity Improvement Process - Systemically Closing the Socio-Technical Gap. STPIS 2020: 195-205
2010 – 2019
- 2019
- [j4]Shao-Fang Wen, Basel Katt:
Managing Software Security Knowledge in Context: An Ontology Based Approach. Inf. 10(6): 216 (2019) - [c39]Muhammad Mudassar Yamin, Basel Katt:
Cyber Security Skill Set Analysis for Common Curricula Development. ARES 2019: 37:1-37:8 - [c38]Shao-Fang Wen, Basel Katt:
Learning Software Security in Context: An Evaluation in Open Source Software Development Environment. ARES 2019: 58:1-58:10 - [c37]Muhammad Mudassar Yamin, Basel Katt:
A Survey of Automated Information Exchange Mechanisms Among CERTs. CERC 2019: 311-322 - [c36]Shao-Fang Wen, Basel Katt:
Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security. EASE 2019: 90-99 - [c35]Grethe Østby, Lars Berg, Mazaher Kianpour, Basel Katt, Stewart Kowalski:
A Socio-Technical Framework to Improve Cyber Security Training: A Work in Progress. STPIS@ECIS 2019: 81-96 - [c34]Felix Schuckert, Basel Katt, Hanno Langweg:
Difficult XSS Code Patterns for Static Code Analysis Tools. IOSec/MSTEC/FINSEC@ESORICS 2019: 123-139 - [c33]Muhammad Mudassar Yamin, Basel Katt:
Mobile device management (MDM) technologies, issues and challenges. ICCSP 2019: 143-147 - [c32]Ankur Shukla, Basel Katt:
Change Point Problem in Security Vulnerability Discovery Model. ICSSA 2019: 21-26 - [c31]Grethe Østby, Basel Katt:
Cyber Crisis Management Roles - A Municipality Responsibility Case Study. ITDRR 2019: 168-181 - [c30]Muhammad Mudassar Yamin, Basel Katt, Mazaher Kianpour:
Cyber Weapons Storage Mechanisms. SpaCCS 2019: 354-367 - 2018
- [c29]Muhammad Mudassar Yamin, Basel Katt:
Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper. AAAI Fall Symposium: ALEC 2018: 41-43 - [c28]Basel Katt, Nishu Prasher:
Quantitative security assurance metrics: REST API case studies. ECSA (Companion) 2018: 59:1-59:7 - [c27]Shao-Fang Wen, Basel Katt:
An Ontology-Based Context Model for Managing Security Knowledge in Software Development. FRUCT 2018: 416-424 - [c26]Erjon Zoto, Stewart Kowalski, Christopher Frantz, Edgar A. Lopez-Rojas, Basel Katt:
A Pilot Study in Cyber Security Education Using CyberAIMs: A Simulation-Based Experiment. World Conference on Information Security Education 2018: 40-54 - [c25]Muhammad Mudassar Yamin, Basel Katt:
Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain. XAILA@JURIX 2018: 33-41 - [c24]Shao-Fang Wen, Mazaher Kianpour, Basel Katt:
Security Knowledge Management in Open Source Software Communities. SecITC 2018: 53-70 - [c23]Muhammad Mudassar Yamin, Basel Katt:
Detecting Malicious Windows Commands Using Natural Language Processing Techniques. SecITC 2018: 157-169 - [c22]Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg:
Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox. Sicherheit 2018: 107-118 - 2017
- [c21]Felix Schuckert, Basel Katt, Hanno Langweg:
Source Code Patterns of SQL Injection Vulnerabilities. ARES 2017: 72:1-72:7 - 2015
- [j3]Michael Felderer, Basel Katt:
A process for mastering security evolution in the development lifecycle. Int. J. Softw. Tools Technol. Transf. 17(3): 245-250 (2015) - 2014
- [j2]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [c20]Thomas Trojer, Basel Katt, Tulay Ozata, Ruth Breu, Patrick Mangesius, Thomas Schabetsberger:
Factors of Access Control Management in Electronic Healthcare: The Patients' Perspective. HICSS 2014: 2967-2976 - [c19]Basel Katt:
A Comprehensive Overview of Security Monitoring Solutions for E-Health Systems. ICHI 2014: 364 - [c18]Philipp Zech, Michael Felderer, Basel Katt, Ruth Breu:
Security Test Generation by Answer Set Programming. SERE 2014: 88-97 - 2012
- [j1]Thomas Trojer, Basel Katt, Ruth Breu, Thomas Schabetsberger, Richard Mair:
Managing Privacy and Effectiveness of Patient-Administered Authorization Policies. Int. J. Comput. Model. Algorithms Medicine 3(2): 43-62 (2012) - [c17]Matthias Gander, Michael Felderer, Basel Katt, Adrian Tolbaru, Ruth Breu, Alessandro Moschitti:
Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning. EternalS@ECAI 2012: 103-116 - [c16]Thomas Trojer, Basel Katt, Thomas Schabetsberger, Ruth Breu, Richard Mair:
Considering privacy and effectiveness of authorization policies for shared electronic health records. IHI 2012: 553-562 - 2011
- [c15]Thomas Trojer, Basel Katt, Thomas Schabetsberger, Richard Mair, Ruth Breu:
The Process of Policy Authoring of Patient-Controlled Privacy Preferences. eHealth 2011: 97-104 - [c14]Matthias Gander, Basel Katt, Michael Felderer, Ruth Breu:
Towards a Model- and Learning-Based Framework for Security Anomaly Detection. FMCO 2011: 150-168 - [c13]Basel Katt, Matthias Gander, Ruth Breu, Michael Felderer:
Enhancing Model Driven Security through Pattern Refinement Techniques. FMCO 2011: 169-183 - [c12]Matthias Gander, Michael Felderer, Basel Katt, Ruth Breu:
Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing. ISoLA Workshops 2011: 162-180 - 2010
- [c11]Basel Katt, Thomas Trojer, Ruth Breu, Thomas Schabetsberger, Florian Wozak:
Meeting EHR Security Requirements: SeAAS Approach. EFMI-STC 2010: 85-91 - [c10]Thomas Trojer, Basel Katt, Florian Wozak, Thomas Schabetsberger:
An Authoring Framework for Security Policies: A Use-Case within the Healthcare Domain. eHealth 2010: 1-9 - [c9]Thomas Schabetsberger, Florian Wozak, Basel Katt, Richard Mair, Bernhard Hirsch, Alexander Hörbst:
Implementation of a Secure and Interoperable Generic e-Health Infrastructure for Shared Electronic Health Records based on IHE Integration Profiles. MedInfo 2010: 889-893 - [c8]Patrick Rempel, Basel Katt, Ruth Breu:
Supporting Role Based Provisioning with Rules Using OWL and F-Logic. OTM Conferences (1) 2010: 600-618 - [c7]Basel Katt, Thomas Trojer, Ruth Breu, Thomas Schabetsberger, Florian Wozak:
Meeting EHR Security Requirements: Authentication as a Security Service. perspeGKtive 2010: 103-110
2000 – 2009
- 2009
- [c6]Basel Katt, Michael Hafner, Xinwen Zhang:
Building a stateful reference monitor with coloured petri nets. CollaborateCom 2009: 1-10 - [c5]Basel Katt, Michael Hafner, Xinwen Zhang:
A usage control policy specification with Petri nets. CollaborateCom 2009: 1-8 - [c4]Basel Katt, Xinwen Zhang, Michael Hafner:
Towards a Usage Control Policy Specification with Petri Nets. OTM Conferences (2) 2009: 905-912 - 2008
- [c3]Basel Katt, Ruth Breu, Michael Hafner, Thomas Schabetsberger, Richard Mair, Florian Wozak:
Privacy and Access Control for IHE-Based Systems. eHealth 2008: 145-153 - [c2]Ruth Breu, Alexander Lechner, Mathias Willburger, Basel Katt:
Workflow Testing. ISoLA 2008: 709-723 - [c1]Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert:
A general obligation model and continuity: enhanced policy enforcement engine for usage control. SACMAT 2008: 123-132
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint