Dan Ionita
Dan Ionita
Geverifieerd e-mailadres voor utwente.nl - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Current established Risk Assessment methodologies and tools
D Ionita
University of Twente, 2013
372013
Risk assessment as an argumentation game
H Prakken, D Ionita, R Wieringa
International Workshop on Computational Logic in Multi-Agent Systems, 357-373, 2013
222013
An information fusion approach for filtering GNSS data sets collected during construction operations
A Vasenev, N Pradhananga, FR Bijleveld, D Ionita, T Hartmann, J Teizer, ...
Advanced engineering informatics 28 (4), 297-310, 2014
202014
Argumentation-Based Security Requirements Elicitation: The Next Round
D Ionita, JW Bullee, RJ Wieringa
Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security …, 2014
122014
Tangible modelling to elicit domain knowledge: an experiment and focus group
D Ionita, R Wieringa, JW Bullee, A Vasenev
International Conference on Conceptual Modeling, 558-565, 2015
112015
Value-driven risk analysis of coordination models
D Ionita, J Gordijn, AS Yesuf, R Wieringa
IFIP Working Conference on The Practice of Enterprise Modeling, 102-116, 2016
102016
Information fusion approach to increase the quality of GNSS data sets in construction equipment operations
A Vasenev, N Pradhananga, F Bijleveld, D Ionita, T Hartmann, J Teizer, ...
Advanced Engineering Informatics 28 (1), 297-310, 2014
102014
Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids
A Vasenev, L Montoya, A Ceccarelli, A Le, D Ionita
Smart Grid Inspired Future Technologies, 184-192, 2017
92017
A business ecosystem architecture modeling framework
R Wieringa, W Engelsman, J Gordijn, D Ionita
2019 IEEE 21st Conference on Business Informatics (CBI) 1, 147-156, 2019
82019
Using value models for business risk analysis in e-service networks
D Ionita, RJ Wieringa, L Wolos, J Gordijn, W Pieters
IFIP Working Conference on The Practice of Enterprise Modeling, 239-253, 2015
82015
Automated identification and prioritization of business risks in e-service networks
D Ionita, RJ Wieringa, J Gordijn
International Conference on Exploring Services Science, 547-560, 2016
72016
Quantitative, value-driven risk analysis of e-services
D Ionita, R Wieringa, J Gordijn, AS Yesuf
Journal of Information Systems 33 (3), 45-60, 2019
52019
ArgueSecure: Out-of-the-box security risk assessment
D Ionita, R Kegel, A Baltuta, R Wieringa
2016 IEEE 24th International Requirements Engineering Conference Workshops …, 2016
52016
Current established risk assessment methodologies and tools, July 2013
D Ionita
URL http://essay. utwente. nl/63830, 0
5
Web-based Collaborative Security Requirements Elicitation.
D Ionita, RJ Wieringa
REFSQ Workshops, 2016
42016
Threat analysis in systems-of-systems: an emergence-oriented approach
A Ceccarelli, T Zoppi, A Vasenev, M Mori, D Ionita, L Montoya, ...
ACM Transactions on Cyber-Physical Systems 3 (2), 1-24, 2018
32018
Modelling telecom fraud with e3value
D Ionita, SK Koenen, RJ Wieringa
CTIT Technical Report Series, 2014
32014
Information fusion of GNSS sensor readings, field notes, and expert’sa priori knowledge
A Vasenev, D Ionita, FR Bijleveld, T Hartmann, AG Doree
EG-ICE workshop, 2013
32013
Investigating the usability and utility of tangible modelling of socio-technical architectures
D Ionita, R Wieringa, JW Bullee, A Vasenev
CTIT Technical Report Series, 2015
22015
Towards risk-driven security requirements management in agile software development
D Ionita, C van der Velden, HJK Ikkink, E Neven, M Daneva, M Kuipers
International Conference on Advanced Information Systems Engineering, 133-144, 2019
12019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20