KL
Publications
- Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context
- An experiment on comparing textual vs. visual industrial methods for security risk assessment
- The role of catalogues of threats and security controls in security risk assessment
- An experimental comparison of two risk-based security methods
- A new, evidence-based, theory for knowledge reuse in security risk analysis
- Poster
- An Evaluation of the Product Security Maturity Model Through Case Studies at 15 Software Producing Organizations
- How Different Elements of Audio Affect the Word Error Rate of Transcripts in Automated Medical Reporting
- Who is the IT Department Anyway
- Canary in the Coal Mine
Usage metrics
Co-workers & collaborators
- IM
I. (Inés) Martinez Bustamante
- TF
Tobias Fiebig
- VB
Veroniek Binkhorst
- WP
Wolter Pieters
- KK
Katharina Krombholz