Остановите войну!
for scientists:
default search action
Federica Paci
- > Home > Persons > Federica Paci
Publications
- 2023
- [j23]Katsiaryna Labunets, Fabio Massacci, Federica Paci, Katja Tuma:
A new, evidence-based, theory for knowledge reuse in security risk analysis. Empir. Softw. Eng. 28(4): 90 (2023) - 2020
- [j21]Sebastian Pape, Federica Paci, Jan Jürjens, Fabio Massacci:
Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach. Inf. 11(5): 261 (2020) - 2018
- [c48]Katsiaryna Labunets, Fabio Massacci, Federica Paci, Sabrina Marczak, Flávio Moreira de Oliveira:
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations. ICSE 2018: 395 - 2017
- [j17]Katsiaryna Labunets, Fabio Massacci, Federica Paci, Sabrina Marczak, Flávio Moreira de Oliveira:
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations. Empir. Softw. Eng. 22(6): 3017-3056 (2017) - [c44]Katsiaryna Labunets, Fabio Massacci, Federica Paci:
On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment. REFSQ 2017: 191-208 - 2015
- [c41]Katsiaryna Labunets, Federica Paci, Fabio Massacci:
Which security catalogue is better for novices? EmpiRE 2015: 25-32 - [c40]Martina de Gramatica, Katsiaryna Labunets, Fabio Massacci, Federica Paci, Alessandra Tedeschi:
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals. REFSQ 2015: 98-114 - 2014
- [j13]Fabio Massacci, Federica Paci, Le Minh Sang Tran, Alessandra Tedeschi:
Assessing a requirements evolution approach: Empirical studies in the air traffic management domain. J. Syst. Softw. 95: 70-88 (2014) - [c38]Fabio Massacci, Federica Paci, Bjørnar Solhaug, Alessandra Tedeschi:
EMFASE - An Empirical Framework for Security Design and Economic Trade-off. ARES 2014: 537-543 - [c37]Matteo Giacalone, Federica Paci, Rocco Mammoliti, Rodolfo Perugino, Fabio Massacci, Claudio Selli:
Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements. ESEM 2014: 24:1-24:8 - [c36]Matteo Giacalone, Rocco Mammoliti, Fabio Massacci, Federica Paci, Rodolfo Perugino, Claudio Selli:
Security triage: A report of a lean security requirements methodology for cost-effective security analysis. EmpiRE 2014: 25-27 - [c35]Katsiaryna Labunets, Federica Paci, Fabio Massacci, Raminder S. Ruprai:
An experiment on comparing textual vs. visual industrial methods for security risk assessment. EmpiRE 2014: 28-35 - [p1]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout, Fabio Massacci, Wouter Joosen:
Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Engineering Secure Future Internet Services and Systems 2014: 35-64 - 2013
- [c32]Katsiaryna Labunets, Fabio Massacci, Federica Paci, Le Minh Sang Tran:
An Experimental Comparison of Two Risk-Based Security Methods. ESEM 2013: 163-172 - 2012
- [c29]Federica Paci, Fabio Massacci, Fabrice Bouquet, Stephane Debricon:
Managing Evolution by Orchestrating Requirements and Testing Engineering Processes. ICST 2012: 834-841 - [c28]Fabio Massacci, Federica Paci:
How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners. NordSec 2012: 89-104 - [c27]Fabio Massacci, Deepa Nagaraj, Federica Paci, Le Minh Sang Tran, Alessandra Tedeschi:
Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain. EmpiRE 2012: 49-56 - 2011
- [c26]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
A Tool for Managing Evolving Security Requirements. CAiSE Forum 2011: 49-56 - [c25]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
A Tool for Managing Evolving Security Requirements. CAiSE Forum (Selected Papers) 2011: 110-125 - [c24]Fabio Massacci, John Mylopoulos, Federica Paci, Thein Than Tun, Yijun Yu:
An Extended Ontology for Security Requirements. CAiSE Workshops 2011: 622-636 - [c23]Edith Felix, Olivier Delande, Fabio Massacci, Federica Paci:
Managing changes with legacy security engineering processes. ISI 2011: 137-142 - [c22]Nicola Dragoni, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci, Federica Paci:
A Load Time Policy Checker for Open Multi-application Smart Cards. POLICY 2011: 153-156 - [c21]Fabio Massacci, Fabrice Bouquet, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, Jan Tobias Mühlberg, Federica Paci, Stéphane Paul, Frank Piessens, Bjørnar Solhaug, Sven Wenzel:
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143 - [c20]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
SeCMER: A Tool to Gain Control of Security Requirements Evolution. ServiceWave 2011: 321-322 - [c19]Yudistira Asnar, Tong Li, Fabio Massacci, Federica Paci:
Computer Aided Threat Identification. CEC 2011: 145-152 - 2010
- [c15]Olga Gadyatskaya, Fabio Massacci, Federica Paci, Sergey A. Stankevich:
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications. NordSec 2010: 187-192
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint