Showing 1 - 20 results of 87 for search 'Flechais, I', query time: 0.07s
Refine Results
-
1
Towards tool−support for Usable Secure Requirements Engineering with CAIRIS by Faily, S, Flechais, I
Published 2010Journal article -
2
Security through Usability: a user−centered approach for balanced security policy requirements by Faily, S, Flechais, I
Published 2010Conference item -
3
Designing and Aligning e−Science Security Culture with Design by Faily, S, Flechais, I
Published 2010Journal article -
4
User−Centered Information Security Policy Development in a Post−Stuxnet World by Faily, S, Flechais, I
Published 2011Conference item -
5
Analysing and Visualising Security and Usability in IRIS by Faily, S, Flechais, I
Published 2010Conference item -
6
Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS. by Faily, S, Flechais, I
Published 2010Journal article -
7
Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework by Faily, S, Flechais, I
Published 2011Journal article -
8
-
9
To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design by Faily, S, Flechais, I
Published 2010Conference item -
10
Security and Usability: Searching for the philosopher's stone by Flechais, I, Faily, S
Published 2010Conference item -
11
Improving Secure Systems Design with Security Culture by Faily, S, Flechais, I
Published 2010Conference item -
12
Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS by Faily, S, Flechais, I
Published 2012Conference item -
13
Barry is not the weakest link: Eliciting Secure System Requirements with Personas by Faily, S, Flechais, I
Published 2010Conference item -
14
Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework. by Faily, S, Flechais, I
Published 2011Journal article -
15
Eliciting Usable Security Requirements with Misusability Cases by Faily, S, Flechais, I
Published 2011Conference item -
16
Persona Cases: A Technique for grounding Personas by Faily, S, Flechais, I
Published 2011Conference item -
17
A Meta−Model for Usable Secure Requirements Engineering by Faily, S, Flechais, I
Published 2010Conference item -
18
Finding and resolving security misusability with misusability cases by Faily, S, Fléchais, I
Published 2014Journal article -
19
Context−Sensitive Requirements and Risk Management with IRIS by Faily, S, Flechais, I
Published 2009Conference item -
20
Persona cases: a technique for grounding personas. by Faily, S, Flechais, I
Published 2011Conference item