Zobrazeno 1 - 10
of 51
pro vyhledávání: '"Hacks, Simon"'
Autor:
Katsikeas, Sotirios, Buhaiu, Andrei, Ekstedt, Mathias, Afzal, Zeeshan, Hacks, Simon, Mukherjee, Preetam
Publikováno v:
In Computers & Security November 2024 146
Process digitization and integration is an increasing need for enterprises, while cyber-attacks denote a growing threat. Using the Business Process Management Notation (BPMN) is common to handle the digital and integration focus within and across org
Externí odkaz:
http://arxiv.org/abs/2106.08568
Publikováno v:
In Procedia Computer Science 2024 237:882-890
In the software development industry, technical debt is regarded as a critical issue in term of the negative consequences such as increased software development cost, low product quality, decreased maintainability, and slowed progress to the long-ter
Externí odkaz:
http://arxiv.org/abs/1907.00677
Publikováno v:
In Computers & Security July 2023 130
Publikováno v:
In Computers & Security June 2022 117
Autor:
Hacks, Simon, Pahl, Julia
Publikováno v:
Journal of Physics: Conference Series; 2024, Vol. 2867 Issue 1, p1-12, 12p
Autor:
Hacks, Simon1 (AUTHOR) shacks@mmmi.sdu.dk, Persson, Linus2 (AUTHOR), Hersén, Nicklas3 (AUTHOR)
Publikováno v:
Software & Systems Modeling. Feb2023, Vol. 22 Issue 1, p31-46. 16p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Advanced Information Systems Engineering ISBN: 9783031074714
Advanced Information Systems Engineering-34th International Conference, CAiSE 2022, Proceedings, 423-439
STARTPAGE=423;ENDPAGE=439;TITLE=Advanced Information Systems Engineering-34th International Conference, CAiSE 2022, Proceedings
Advanced Information Systems Engineering-34th International Conference, CAiSE 2022, Proceedings, 423-439
STARTPAGE=423;ENDPAGE=439;TITLE=Advanced Information Systems Engineering-34th International Conference, CAiSE 2022, Proceedings
The digital transformation exposes organizations to new threats endangering their business. A way to uncover these threats is threat modeling and attack simulations. However, modeling an entire organization by hand is time consuming and error prone.