Dan Ionita
Dan Ionita
Verified email at utwente.nl - Homepage
Cited by
Cited by
Current established Risk Assessment methodologies and tools
D Ionita
University of Twente, 2013
Risk assessment as an argumentation game
H Prakken, D Ionita, R Wieringa
International Workshop on Computational Logic in Multi-Agent Systems, 357-373, 2013
An information fusion approach for filtering GNSS data sets collected during construction operations
A Vasenev, N Pradhananga, FR Bijleveld, D Ionita, T Hartmann, J Teizer, ...
Advanced engineering informatics 28 (4), 297-310, 2014
A business ecosystem architecture modeling framework
RJ Wieringa, W Engelsman, J Gordijn, D Ionita
2019 IEEE 21st Conference on Business Informatics (CBI) 1, 147-156, 2019
Argumentation-Based Security Requirements Elicitation: The Next Round
D Ionita, JW Bullee, RJ Wieringa
Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security …, 2014
Tangible modelling to elicit domain knowledge: an experiment and focus group
D Ionita, R Wieringa, JW Bullee, A Vasenev
International Conference on Conceptual Modeling, 558-565, 2015
Information fusion approach to increase the quality of GNSS data sets in construction equipment operations
A Vasenev, N Pradhananga, F Bijleveld, D Ionita, T Hartmann, J Teizer, ...
Advanced Engineering Informatics 28 (1), 297-310, 2014
Value-driven risk analysis of coordination models
D Ionita, J Gordijn, AS Yesuf, R Wieringa
IFIP Working Conference on The Practice of Enterprise Modeling, 102-116, 2016
Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids
A Vasenev, L Montoya, A Ceccarelli, A Le, D Ionita
Smart Grid Inspired Future Technologies, 184-192, 2017
Using value models for business risk analysis in e-service networks
D Ionita, RJ Wieringa, L Wolos, J Gordijn, W Pieters
IFIP Working Conference on The Practice of Enterprise Modeling, 239-253, 2015
Threat analysis in systems-of-systems: an emergence-oriented approach
A Ceccarelli, T Zoppi, A Vasenev, M Mori, D Ionita, L Montoya, ...
ACM Transactions on Cyber-Physical Systems 3 (2), 1-24, 2018
Automated identification and prioritization of business risks in e-service networks
D Ionita, RJ Wieringa, J Gordijn
International Conference on Exploring Services Science, 547-560, 2016
Quantitative, value-driven risk analysis of e-services
D Ionita, R Wieringa, J Gordijn, AS Yesuf
Journal of Information Systems 33 (3), 45-60, 2019
ArgueSecure: Out-of-the-box security risk assessment
D Ionita, R Kegel, A Baltuta, R Wieringa
2016 IEEE 24th International Requirements Engineering Conference Workshops …, 2016
Web-based Collaborative Security Requirements Elicitation.
D Ionita, RJ Wieringa
REFSQ Workshops, 2016
Current established risk assessment methodologies and tools, July 2013
D Ionita
URL http://essay. utwente. nl/63830, 0
Modelling telecom fraud with e3value
D Ionita, SK Koenen, RJ Wieringa
CTIT Technical Report Series, 2014
Information fusion of GNSS sensor readings, field notes, and expert’sa priori knowledge
A Vasenev, D Ionita, FR Bijleveld, T Hartmann, AG Doree
EG-ICE workshop, 2013
Towards risk-driven security requirements management in agile software development
D Ionita, C van der Velden, HJK Ikkink, E Neven, M Daneva, M Kuipers
International Conference on Advanced Information Systems Engineering, 133-144, 2019
Model-Driven Information Security Risk Assessment of Socio-Technical Systems
D Ionita
The system can't perform the operation now. Try again later.
Articles 1–20