An analysis and classification of public information security data sources used in research and practice C Sauerwein, I Pekaric, M Felderer, R Breu Computers & security 82, 140-155, 2019 | 83 | 2019 |
How is security testing done in agile teams? A cross-case analysis of four software teams DS Cruzes, M Felderer, TD Oyetoyan, M Gander, I Pekaric Agile Processes in Software Engineering and Extreme Programming: 18th …, 2017 | 61 | 2017 |
A taxonomy of attack mechanisms in the automotive domain I Pekaric, C Sauerwein, S Haselwanter, M Felderer Computer Standards & Interfaces 78, 103539, 2021 | 41 | 2021 |
Towards understanding the skill gap in cybersecurity F Goupil, P Laskov, I Pekaric, M Felderer, A Dürr, F Thiesse Proceedings of the 27th ACM Conference on on Innovation and Technology in …, 2022 | 24 | 2022 |
Applying security testing techniques to automotive engineering I Pekaric, C Sauerwein, M Felderer Proceedings of the 14th International Conference on Availability …, 2019 | 23 | 2019 |
A systematic review on security and safety of self-adaptive systems I Pekaric, R Groner, T Witte, JG Adigun, A Raschke, M Felderer, M Tichy Journal of Systems and Software 203, 111716, 2023 | 12 | 2023 |
Towards model co-evolution across self-adaptation steps for combined safety and security analysis T Witte, R Groner, A Raschke, M Tichy, I Pekaric, M Felderer Proceedings of the 17th Symposium on Software Engineering for Adaptive and …, 2022 | 9 | 2022 |
Research Challenges in Empowering Agile Teams with Security Knowledge Based on Public and Private Information Sources. M Felderer, I Pekaric SecSE@ ESORICS, 1-7, 2017 | 7 | 2017 |
Model-based generation of attack-fault trees R Groner, T Witte, A Raschke, S Hirn, I Pekaric, M Frick, M Tichy, ... International Conference on Computer Safety, Reliability, and Security, 107-120, 2023 | 4 | 2023 |
Simulation of sensor spoofing attacks on unmanned aerial vehicles using the gazebo simulator I Pekaric, D Arnold, M Felderer 2022 IEEE 22nd International Conference on Software Quality, Reliability …, 2022 | 3 | 2022 |
VULNERLIZER: cross-analysis between vulnerabilities and software libraries I Pekaric, M Felderer, P Steinmüller arXiv preprint arXiv:2309.09649, 2023 | 2 | 2023 |
Understanding the Process of Data Labeling in Cybersecurity T Braun, I Pekaric, G Apruzzese Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 1596-1605, 2024 | 1 | 2024 |
Streamlining Attack Tree Generation: A Fragment-Based Approach I Pekaric, M Frick, JG Adigun, R Groner, T Witte, A Raschke, M Felderer, ... arXiv preprint arXiv:2310.00654, 2023 | | 2023 |