


Остановите войну!
for scientists:


default search action
Katsiaryna Labunets
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j2]Katsiaryna Labunets
, Fabio Massacci, Federica Paci, Katja Tuma
:
A new, evidence-based, theory for knowledge reuse in security risk analysis. Empir. Softw. Eng. 28(4): 90 (2023) - [c16]Emma Kwint, Anna Zoet, Katsiaryna Labunets, Sjaak Brinkkemper:
How Different Elements of Audio Affect the Word Error Rate of Transcripts in Automated Medical Reporting. HEALTHINF 2023: 179-187 - [c15]Jan-Philip van Acken
, Joost F. Gadellaa
, Slinger Jansen
, Katsiaryna Labunets
:
Poster: The Unknown Unknown: Cybersecurity Threats of Shadow IT in Higher Education. CCS 2023: 3633-3635 - 2022
- [c14]Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets:
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context. USENIX Security Symposium 2022: 3433-3450
2010 – 2019
- 2019
- [c13]Katsiaryna Labunets, Nelly Condori-Fernández:
Assessing the effect of learning styles on risk model comprehensibility: A controlled experiment (short paper). REFSQ Workshops 2019 - [i1]David Ríos Insua, Aitor Couce Vieira, José Antonio Rubio, Wolter Pieters, Katsiaryna Labunets, Daniel Garcia Rasines:
An Adversarial Risk Analysis Framework for Cybersecurity. CoRR abs/1903.07727 (2019) - 2018
- [c12]Katsiaryna Labunets:
No search allowed: what risk modeling notation to choose? ESEM 2018: 20:1-20:10 - [c11]Katsiaryna Labunets, Fabio Massacci, Federica Paci, Sabrina Marczak, Flávio Moreira de Oliveira:
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations. ICSE 2018: 395 - 2017
- [j1]Katsiaryna Labunets, Fabio Massacci
, Federica Paci
, Sabrina Marczak, Flávio Moreira de Oliveira:
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations. Empir. Softw. Eng. 22(6): 3017-3056 (2017) - [c10]Katsiaryna Labunets, Fabio Massacci
, Alessandra Tedeschi:
Graphical vs. Tabular Notations for Risk Models: On the Role of Textual Labels and Complexity. ESEM 2017: 267-276 - [c9]Luca Allodi, Silvio Biagioni, Bruno Crispo, Katsiaryna Labunets, Fabio Massacci
, Wagner Santos:
Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment. FDSE 2017: 23-39 - [c8]Katsiaryna Labunets, Andrea Janes
, Michael Felderer, Fabio Massacci
:
Teaching predictive modeling to junior software engineers - seminar format and its evaluation: poster. ICSE (Companion Volume) 2017: 339-340 - [c7]Katsiaryna Labunets, Fabio Massacci
, Federica Paci
:
On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment. REFSQ 2017: 191-208 - 2016
- [b1]Katsiaryna Labunets:
Security Risk Assessment Methods: An Evaluation Framework and Theoretical Model of the Criteria Behind Methods Success. University of Trento, Italy, 2016 - [c6]Olga Gadyatskaya, Katsiaryna Labunets, Federica Paci
:
Towards Empirical Evaluation of Automated Risk Assessment Methods. CRiSIS 2016: 77-86 - [c5]Evellin Cardoso, Katsiaryna Labunets, Fabiano Dalpiaz, John Mylopoulos, Paolo Giorgini
:
Modeling Structured and Unstructured Processes: An Empirical Evaluation. ER 2016: 347-361 - 2015
- [c4]Katsiaryna Labunets, Federica Paci
, Fabio Massacci
:
Which security catalogue is better for novices? EmpiRE 2015: 25-32 - [c3]Martina de Gramatica, Katsiaryna Labunets
, Fabio Massacci
, Federica Paci
, Alessandra Tedeschi:
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals. REFSQ 2015: 98-114 - 2014
- [c2]Katsiaryna Labunets
, Federica Paci
, Fabio Massacci
, Raminder S. Ruprai:
An experiment on comparing textual vs. visual industrial methods for security risk assessment. EmpiRE 2014: 28-35 - [p1]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout
, Fabio Massacci
, Wouter Joosen:
Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Engineering Secure Future Internet Services and Systems 2014: 35-64 - 2013
- [c1]Katsiaryna Labunets
, Fabio Massacci
, Federica Paci
, Le Minh Sang Tran:
An Experimental Comparison of Two Risk-Based Security Methods. ESEM 2013: 163-172
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-11-29 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint